Sciweavers

839 search results - page 42 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
ACNS
2009
Springer
113views Cryptology» more  ACNS 2009»
15 years 4 months ago
Fast Packet Classification Using Condition Factorization
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
ESWA
2007
178views more  ESWA 2007»
15 years 14 days ago
Educational data mining: A survey from 1995 to 2005
ct 7 Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing 8 research community. This paper surveys the ...
Cristóbal Romero, Sebastián Ventura
109
Voted
TIME
2008
IEEE
15 years 7 months ago
Time Aware Mining of Itemsets
Frequent behavioural pattern mining is a very important topic of knowledge discovery, intended to extract correlations between items recorded in large databases or Web acces logs....
Bashar Saleh, Florent Masseglia
ACSAC
2005
IEEE
15 years 6 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
129
Voted
ICDCS
1999
IEEE
15 years 4 months ago
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems
There is growing interest in run-time detection as parallel and distributed systems grow larger and more complex. This work targets run-time analysis of complex, interactive scien...
Beth Plale, Karsten Schwan