Sciweavers

839 search results - page 89 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
99
Voted
KAIS
2010
139views more  KAIS 2010»
14 years 11 months ago
Periodic subgraph mining in dynamic networks
In systems of interacting entities such as social networks, interactions that occur regularly typically correspond to significant, yet often infrequent and hard to detect, interact...
Mayank Lahiri, Tanya Y. Berger-Wolf
ESORICS
2012
Springer
13 years 3 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
104
Voted
ICDCS
2010
IEEE
15 years 4 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
117
Voted
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
15 years 2 months ago
Visually Mining through Cluster Hierarchies
Similarity search in database systems is becoming an increasingly important task in modern application domains such as multimedia, molecular biology, medical imaging, computer aid...
Stefan Brecheisen, Hans-Peter Kriegel, Peer Kr&oum...
102
Voted
GI
2004
Springer
15 years 6 months ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...