Sciweavers

839 search results - page 62 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 7 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
EDCC
2005
Springer
15 years 6 months ago
A Data Mining Approach to Identify Key Factors in Dependability Experiments
Abstract. Our paper presents a novel approach for identifying the key infrastructural factors determining the behavior of systems in the presence of faults by the application of in...
Gergely Pintér, Henrique Madeira, Marco Vie...
132
Voted
ICDIM
2010
IEEE
14 years 10 months ago
Data mining and automatic OLAP schema generation
Data mining aims at extraction of previously unidentified information from large databases. It can be viewed as an automated application of algorithms to discover hidden patterns a...
Muhammad Usman, Sohail Asghar, Simon Fong
97
Voted
KDD
2002
ACM
152views Data Mining» more  KDD 2002»
16 years 1 months ago
Multimedia Data Mining Framework For Raw Video Sequences
In this paper, we propose a general framework for real time video data mining to be applied to the raw videos (traffic videos, surveillance videos, etc.). We investigate whether t...
Jung-Hwan Oh, Babitha Bandi
89
Voted
RAID
2009
Springer
15 years 7 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...