Sciweavers

479 search results - page 32 / 96
» Intrusion Detection Based on Data Mining
Sort
View
BMCBI
2005
99views more  BMCBI 2005»
14 years 11 months ago
CGH-Profiler: Data mining based on genomic aberration profiles
Background: CGH-Profiler is a program that supports the analysis of genomic aberrations measured by Comparative Genomic Hybridisation (CGH). Comparative genomic hybridisation (CGH...
Falk Schubert, Bernhard Tausch, Stefan Joos, Rolan...
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 4 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 8 days ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
16 years 1 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
ICDM
2005
IEEE
165views Data Mining» more  ICDM 2005»
15 years 5 months ago
Optimizing Constraint-Based Mining by Automatically Relaxing Constraints
In constraint-based mining, the monotone and antimonotone properties are exploited to reduce the search space. Even if a constraint has not such suitable properties, existing algo...
Arnaud Soulet, Bruno Crémilleux