Sciweavers

839 search results - page 25 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
102
Voted
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 1 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
104
Voted
ICMLA
2004
15 years 1 months ago
Outlier detection and evaluation by network flow
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Ying Liu, Alan P. Sprague
100
Voted
MIE
2008
177views Healthcare» more  MIE 2008»
15 years 1 months ago
Process Mining Techniques: an Application to Stroke Care
In a competitive health-care market, hospitals have to focus on ways to streamline their processes in order to deliver high quality care while at the same time reducing costs. To a...
Ronny Mans, Helen Schonenberg, Giorgio Leonardi, S...
118
Voted
AHSWN
2006
206views more  AHSWN 2006»
15 years 16 days ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
137
Voted
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 2 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...