Sciweavers

839 search results - page 54 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
111
Voted
EDBTW
2010
Springer
14 years 10 months ago
A decision support system to improve e-learning environments
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
Marta E. Zorrilla, Diego García, Elena &Aac...
93
Voted
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
15 years 6 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...
KDD
2002
ACM
173views Data Mining» more  KDD 2002»
16 years 29 days ago
LumberJack: Intelligent Discovery and Analysis of Web User Traffic Composition
Web Usage Mining enables new understanding of user goals on the Web. This understanding has broad applications, and traditional mining techniques such as association rules have bee...
Ed Huai-hsin Chi, Adam Rosien, Jeffrey Heer
128
Voted
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 19 days ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 29 days ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye