Sciweavers

839 search results - page 29 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
127
Voted
PARCO
1997
15 years 1 months ago
Parallel Database Techniques in Decision Support and Data Mining
During the last decade, all commercial database systems have included features for parallel processing into their products. This development has been driven by the fact that datab...
Andreas Reuter
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 6 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
108
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 27 days ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
100
Voted
USENIX
2007
15 years 2 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
116
Voted
ITNG
2010
IEEE
14 years 11 months ago
Scalable Intrusion Detection with Recurrent Neural Networks
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome