Sciweavers

839 search results - page 39 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
IIE
2008
98views more  IIE 2008»
15 years 16 days ago
Data Mining Application in Higher Learning Institutions
One of the biggest challenges that higher learning institutions face today is to improve the quality of managerial decisions. The managerial decision making process becomes more co...
Naeimeh Delavari, Somnuk Phon-Amnuaisuk, M. Reza B...
CCS
2010
ACM
15 years 21 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
104
Voted
IMC
2006
ACM
15 years 6 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
100
Voted
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 11 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
SDM
2008
SIAM
147views Data Mining» more  SDM 2008»
15 years 1 months ago
The Asymmetric Approximate Anytime Join: A New Primitive with Applications to Data Mining
It has long been noted that many data mining algorithms can be built on top of join algorithms. This has lead to a wealth of recent work on efficiently supporting such joins with ...
Lexiang Ye, Xiaoyue Wang, Dragomir Yankov, Eamonn ...