Sciweavers

3651 search results - page 14 / 731
» Data Mining for Security Applications
Sort
View
APCCM
2006
14 years 11 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
CCGRID
2008
IEEE
15 years 4 months ago
A Performance Study of Secure Data Mining on the Cell Processor
— This paper examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the p...
Hong Wang 0006, Hiroyuki Takizawa, Hiroaki Kobayas...
94
Voted
SIGKDD
2002
172views more  SIGKDD 2002»
14 years 9 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
ICDM
2006
IEEE
123views Data Mining» more  ICDM 2006»
15 years 4 months ago
Cluster Ranking with an Application to Mining Mailbox Networks
Ziv Bar-Yossef, Ido Guy, Ronny Lempel, Yoëlle...
KDD
1998
ACM
98views Data Mining» more  KDD 1998»
15 years 2 months ago
FlexiMine - A Flexible Platform for KDD Research and Application Construction
Carmel Domshlak, D. Gershkovich, Ehud Gudes, N. Li...