Sciweavers

3651 search results - page 9 / 731
» Data Mining for Security Applications
Sort
View
104
Voted
SACMAT
2010
ACM
15 years 4 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
149
Voted
ISI
2008
Springer
15 years 7 days ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 20 days ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
106
Voted
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
14 years 10 months ago
Discovering Temporal Features and Relations of Activity Patterns
An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
Ehsan Nazerfard, Parisa Rashidi, Diane J. Cook
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
15 years 5 days ago
Biological data mining
Mohammed Javeed Zaki, Naren Ramakrishnan, Srinivas...