Sciweavers

479 search results - page 37 / 96
» Intrusion Detection Based on Data Mining
Sort
View
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 6 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
SDM
2009
SIAM
343views Data Mining» more  SDM 2009»
15 years 9 months ago
Change-Point Detection in Time-Series Data by Direct Density-Ratio Estimation.
Change-point detection is the problem of discovering time points at which properties of time-series data change. This covers a broad range of real-world problems and has been acti...
Masashi Sugiyama, Yoshinobu Kawahara
CIVR
2006
Springer
104views Image Analysis» more  CIVR 2006»
15 years 3 months ago
Video Mining with Frequent Itemset Configurations
Abstract. We present a method for mining frequently occurring objects and scenes from videos. Object candidates are detected by finding recurring spatial arrangements of affine cov...
Till Quack, Vittorio Ferrari, Luc J. Van Gool
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 4 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
KDD
2003
ACM
192views Data Mining» more  KDD 2003»
16 years 7 days ago
Efficient elastic burst detection in data streams
Burst detection is the activity of finding abnormal aggregates in data streams. Such aggregates are based on sliding windows over data streams. In some applications, we want to mo...
Yunyue Zhu, Dennis Shasha