Sciweavers

3651 search results - page 45 / 731
» Data Mining for Security Applications
Sort
View
103
Voted
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 1 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
113
Voted
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
15 years 6 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
EDBT
2009
ACM
90views Database» more  EDBT 2009»
15 years 7 months ago
Privacy-preserving data mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers ...
Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patr...
112
Voted
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 1 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
108
Voted
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
15 years 6 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang