Sciweavers

839 search results - page 23 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
NDSS
2000
IEEE
15 years 4 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
15 years 4 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee
AINA
2007
IEEE
15 years 6 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 26 days ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
91
Voted
PAKDD
2009
ACM
103views Data Mining» more  PAKDD 2009»
15 years 7 months ago
Hot Item Detection in Uncertain Data
Abstract. An object o of a database D is called a hot item, if there is a sufficiently large population of other objects in D that are similar to o. In other words, hot items are ...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...