Sciweavers

839 search results - page 52 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 29 days ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
PAKDD
2009
ACM
149views Data Mining» more  PAKDD 2009»
15 years 5 months ago
A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data
Detecting outliers which are grossly different from or inconsistent with the remaining dataset is a major challenge in real-world KDD applications. Existing outlier detection met...
Ke Zhang, Marcus Hutter, Huidong Jin
96
Voted
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 7 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz
SIGSOFT
2005
ACM
15 years 6 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
108
Voted
GPC
2009
Springer
14 years 10 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb