Sciweavers

839 search results - page 22 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
ICDCSW
2005
IEEE
15 years 6 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
93
Voted
CAISE
2006
Springer
15 years 4 months ago
Data Conceptualisation for Web-Based Data-Centred Application Design
The paper describes the conceptualisation process in the ReQuest approach, a wide-spectrum methodology for web-based information systems analysis and development. This methodology ...
Julien Vilz, Anne-France Brogneaux, Ravi Ramdoyal,...
102
Voted
PAKDD
2005
ACM
103views Data Mining» more  PAKDD 2005»
15 years 6 months ago
Subgroup Discovery Techniques and Applications
This paper presents the advances in subgroup discovery and the ways to use subgroup discovery to generate actionable knowledge for decision support. Actionable knowledge is explici...
Nada Lavrac
114
Voted
SNPD
2007
15 years 1 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
ISI
2008
Springer
15 years 14 days ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen