Sciweavers

839 search results - page 70 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
110
Voted
EUROSYS
2008
ACM
15 years 9 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
111
Voted
DEXAW
1998
IEEE
116views Database» more  DEXAW 1998»
15 years 4 months ago
Data-Mining: A Tightly-Coupled Implementation on a Parallel Database Server
Due to the increasingly di culty of discovering patterns in real-world databases using only conventional OLAP tools, an automated process such as data mining is currently essentia...
Mauro Sousa, Marta Mattoso, Nelson F. F. Ebecken
102
Voted
MINENET
2005
ACM
15 years 6 months ago
Topographical proximity for mining network alarm data
Increasingly powerful fault management systems are required to ensure robustness and quality of service in today’s networks. In this context, event correlation is of prime impor...
Ann Devitt, Joseph Duffin, Robert Moloney
138
Voted
ICTAI
1997
IEEE
15 years 4 months ago
Web Mining: Information and Pattern Discovery on the World Wide Web
Application of data mining techniques to the World Wide Web, referred to as Web mining, has been the focus of several recent research projects and papers. However, there is no est...
Robert Cooley, Bamshad Mobasher, Jaideep Srivastav...
90
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 21 days ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin