Sciweavers

839 search results - page 67 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
108
Voted
IPCCC
2007
IEEE
15 years 7 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
133
Voted
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 18 days ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
107
Voted
ACMSE
2005
ACM
15 years 2 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 6 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
133
Voted
IEAAIE
2005
Springer
15 years 6 months ago
Analyzing Multi-level Spatial Association Rules Through a Graph-Based Visualization
Association rules discovery is a fundamental task in spatial data mining where data are naturally described at multiple levels of granularity. ARES is a spatial data mining system ...
Annalisa Appice, Paolo Buono