Sciweavers

839 search results - page 32 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
137
Voted
IPPS
2005
IEEE
15 years 6 months ago
A Parallel Algorithm for Correlating Event Streams
This paper describes a parallel algorithm for correlating or “fusing” streams of data from sensors and other sources of information. The algorithm is useful for applications w...
Daniel M. Zimmerman, K. Mani Chandy
77
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
114
Voted
CBMS
2007
IEEE
15 years 6 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
102
Voted
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 5 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
ICTAI
1999
IEEE
15 years 4 months ago
Neural Data Mining for Credit Card Fraud Detection
The prevention of credit card fraud is an important application for prediction techniques. One major obstacle for using neural network training techniques is the high necessary di...
R. Brause, T. Langsdorf, Michael Hepp