Sciweavers

3651 search results - page 6 / 731
» Data Mining for Security Applications
Sort
View
ICCS
2007
Springer
15 years 4 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
ICDM
2005
IEEE
199views Data Mining» more  ICDM 2005»
15 years 3 months ago
CoLe: A Cooperative Data Mining Approach and Its Application to Early Diabetes Detection
We present CoLe, a cooperative data mining approach for discovering hybrid knowledge. It employs multiple different data mining algorithms, and combines results from them to enhan...
Jie Gao, Jörg Denzinger, Robert C. James
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
14 years 10 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 4 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
DMKD
2004
ACM
115views Data Mining» more  DMKD 2004»
15 years 3 months ago
Privacy-preserving data integration and sharing
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume ...
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gun...