Sciweavers

839 search results - page 84 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
113
Voted
IRI
2008
IEEE
15 years 7 months ago
Compound record clustering algorithm for design pattern detection by decision tree learning
Recovering design patterns applied in a system can help refactoring the system. Machine learning algorithms have been successfully applied in mining data patterns. However, one of...
Jing Dong, Yongtao Sun, Yajing Zhao
96
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
102
Voted
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 1 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
WWW
2004
ACM
16 years 1 months ago
Visual web mining
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
119
Voted
CGA
2005
15 years 16 days ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...