Sciweavers

839 search results - page 43 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
89
Voted
AAAI
2006
15 years 1 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
138
Voted
IADIS
2009
14 years 10 months ago
Proposed framework for data mining in e-learning: The case of open e-class
Web-based learning environments are extensively used nowadays. These environments maintain and produce vast amounts of data. Such vastness lead to the application of data mining t...
Ioannis Kazanidis, Stavros Valsamidis, Theodosios ...
118
Voted
SACMAT
2003
ACM
15 years 5 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
115
Voted
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 20 days ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
ALT
2010
Springer
15 years 2 months ago
Contrast Pattern Mining and Its Application for Building Robust Classifiers
: The ability to distinguish, differentiate and contrast between different data sets is a key objective in data mining. Such ability can assist domain experts to understand their d...
Kotagiri Ramamohanarao