Sciweavers

839 search results - page 97 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
HASE
2007
IEEE
15 years 7 months ago
A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance
We adapt the classic cusum change-point detection algorithm for applications to data network monitoring where various and numerous performance and reliability metrics are availabl...
Qi Zhang, Carlos Rendón, Veronica Montes De...
ADAPTIVE
2007
Springer
15 years 6 months ago
Case-Based Recommendation
Abstract. Data Mining, or Knowledge Discovery as it is also known, is becoming increasingly useful in a wide variety of applications. In the following paper, we look at its use in ...
Barry Smyth
HIPC
2005
Springer
15 years 6 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
84
Voted
EMNLP
2010
14 years 10 months ago
Improving Gender Classification of Blog Authors
The problem of automatically classifying the gender of a blog author has important applications in many commercial domains. Existing systems mainly use features such as words, wor...
Arjun Mukherjee, Bing Liu
IEEEARES
2009
IEEE
15 years 7 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop