Sciweavers

839 search results - page 101 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
122
Voted
IAJIT
2010
133views more  IAJIT 2010»
14 years 11 months ago
Mediation Queries Adaptation After the Removal of a Data Source
: A broad variety of data is available in distinct heterogeneous sources, stored under different formats: database formats (in relational and object-oriented models), document form...
Latifa Baba-hamed
98
Voted
ISW
2009
Springer
15 years 7 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
HOTI
2008
IEEE
15 years 7 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
VLDB
2005
ACM
112views Database» more  VLDB 2005»
15 years 6 months ago
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks
This paper presents a set of algorithms for efficiently evaluating join queries over static data tables in sensor networks. We describe and evaluate three algorithms that take adv...
Daniel J. Abadi, Samuel Madden, Wolfgang Lindner
99
Voted
NIPS
2001
15 years 2 months ago
Model Based Population Tracking and Automatic Detection of Distribution Changes
Probabilistic mixture models are used for a broad range of data analysis tasks such as clustering, classification, predictive modeling, etc. Due to their inherent probabilistic na...
Igor V. Cadez, Paul S. Bradley