Sciweavers

6318 search results - page 55 / 1264
» Data Leakage Detection
Sort
View
DIAU
2000
Springer
15 years 4 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
ICDM
2007
IEEE
301views Data Mining» more  ICDM 2007»
15 years 3 months ago
Stream Event Detection: A Unified Framework for Mining Outlier, Change and Burst Simultaneously over Data Stream
Event detection is one of the most important issues of event processing system, especially Complex Event Processing (CEP). Outlier event, change event and burst event are three ty...
Zhijian Yuan, Kai Du, Yan Jia, Jiajia Miao
VIS
2004
IEEE
148views Visualization» more  VIS 2004»
16 years 1 months ago
Detection and Visualization of Anomalous Structures in Molecular Dynamics Simulation Data
In this article we explore techniques to detect and visualize features in data from molecular dynamics (MD) simulations. Although the techniques proposed are general, we focus on ...
John Wilkins, Kaden Hazzard, Raghu Machiraju, Same...
IAT
2006
IEEE
15 years 6 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
SSD
2005
Springer
153views Database» more  SSD 2005»
15 years 5 months ago
Change Detection in Time Series Data Using Wavelet Footprints
In this paper, we propose a novel approach to address the problem of change detection in time series data. Our approach is based on wavelet footprints proposed originally by the si...
Mehdi Sharifzadeh, Farnaz Azmoodeh, Cyrus Shahabi