Sciweavers

3651 search results - page 18 / 731
» Data Mining for Security Applications
Sort
View
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 4 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
85
Voted
EDBT
2008
ACM
172views Database» more  EDBT 2008»
15 years 10 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
82
Voted
TON
2008
102views more  TON 2008»
14 years 10 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
IEAAIE
2004
Springer
15 years 3 months ago
OIDM: Online Interactive Data Mining
Facilitated by the achievements of various data mining techniques, both academic research and industrial applications are using data mining tools to explore knowledge from various ...
Qijun Chen, Xindong Wu, Xingquan Zhu