Sciweavers

1486 search results - page 31 / 298
» Firewall Rules Analysis
Sort
View
SADFE
2007
IEEE
15 years 6 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
15 years 4 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...
PAKDD
1999
ACM
129views Data Mining» more  PAKDD 1999»
15 years 4 months ago
Visually Aided Exploration of Interesting Association Rules
Association rules are a class of important regularities in databases. They are found to be very useful in practical applications. However, the number of association rules discovere...
Bing Liu, Wynne Hsu, Ke Wang, Shu Chen
IDA
2003
Springer
15 years 5 months ago
Constructing Hierarchical Rule Systems
Rule systems have failed to attract much interest in large data analysis problems because they tend to be too simplistic to be useful or consist of too many rules for human interpr...
Thomas R. Gabriel, Michael R. Berthold
DIMVA
2006
15 years 1 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...