Sciweavers

839 search results - page 48 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
132
Voted
KDD
2004
ACM
106views Data Mining» more  KDD 2004»
16 years 28 days ago
Early detection of insider trading in option markets
"Inside information" comes in many forms: knowledge of a corporate takeover, a terrorist attack, unexpectedly poor earnings, the FDA's acceptance of a new drug, etc...
Steve Donoho
131
Voted
HIPC
1999
Springer
15 years 4 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava
137
Voted
USS
2010
14 years 10 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
KDD
2004
ACM
198views Data Mining» more  KDD 2004»
15 years 5 months ago
Mining traffic data from probe-car system for travel time prediction
We are developing a technique to predict travel time of a vehicle for an objective road section, based on real time traffic data collected through a probe-car system. In the area ...
Takayuki Nakata, Jun-ichi Takeuchi
107
Voted
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 28 days ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...