Sciweavers

3651 search results - page 17 / 731
» Data Mining for Security Applications
Sort
View
86
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
89
Voted
DMIN
2006
115views Data Mining» more  DMIN 2006»
14 years 11 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
ICTAI
2010
IEEE
14 years 7 months ago
Pocket Data Mining: Towards Collaborative Data Mining in Mobile Computing Environments
Abstract--Pocket Data Mining PDM is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data stre...
Frederic T. Stahl, Mohamed Medhat Gaber, Max Brame...
KDD
1998
ACM
164views Data Mining» more  KDD 1998»
15 years 2 months ago
A Data Mining Support Environment and its Application on Insurance Data
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Martin Staudt, Jörg-Uwe Kietz, Ulrich Reimer
KDD
2005
ACM
73views Data Mining» more  KDD 2005»
15 years 10 months ago
Using relational knowledge discovery to prevent securities fraud
We describe an application of relational knowledge discovery to a key regulatory mission of the National Association of Securities Dealers (NASD). NASD is the world's largest...
Özgür Simsek, David Jensen, Henry G. Gol...