Sciweavers

839 search results - page 14 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
174
Voted
ICMCS
2007
IEEE
190views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Video Event Detection with Combined Distance-Based and Rule-Based Data Mining Techniques
In this paper, the rare event detection issue in video event detection is addressed through the proposed data mining framework which can be generalized to be domain independent. T...
Zongxing Xie, Mei-Ling Shyu, Shu-Ching Chen
ACSC
2005
IEEE
15 years 6 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ICDM
2010
IEEE
185views Data Mining» more  ICDM 2010»
14 years 10 months ago
Detecting Non-compliant Consumers in Spatio-Temporal Health Data: A Case Study from Medicare Australia
This paper describes our experience with applying data mining techniques to the problem of fraud detection in spatio-temporal health data in Medicare Australia. A modular framework...
Kee Siong Ng, Yin Shan, D. Wayne Murray, Alison Su...
98
Voted
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 6 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
99
Voted
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
15 years 5 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang