Sciweavers

839 search results - page 56 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
145
Voted
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 7 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
102
Voted
DOLAP
2006
ACM
15 years 6 months ago
Enhanced mining of association rules from data cubes
On-line analytical processing (OLAP) provides tools to explore and navigate into data cubes in order to extract interesting information. Nevertheless, OLAP is not capable of expla...
Riadh Ben Messaoud, Sabine Loudcher Rabaséd...
109
Voted
WORM
2003
15 years 1 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
230
Voted
TCSV
2008
166views more  TCSV 2008»
15 years 14 days ago
A Framework for Evaluating Stereo-Based Pedestrian Detection Techniques
Automated pedestrian detection, counting, and tracking have received significant attention in the computer vision community of late. As such, a variety of techniques have been inve...
Philip Kelly, Noel E. O'Connor, Alan F. Smeaton
123
Voted
IS
2007
15 years 14 days ago
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....