Sciweavers

479 search results - page 46 / 96
» Intrusion Detection Based on Data Mining
Sort
View
ICDM
2009
IEEE
153views Data Mining» more  ICDM 2009»
14 years 9 months ago
A New Clustering Algorithm Based on Regions of Influence with Self-Detection of the Best Number of Clusters
Clustering methods usually require to know the best number of clusters, or another parameter, e.g. a threshold, which is not ever easy to provide. This paper proposes a new graph-b...
Fabrice Muhlenbach, Stéphane Lallich
ICDM
2009
IEEE
122views Data Mining» more  ICDM 2009»
15 years 6 months ago
Detecting and Interpreting Variable Interactions in Observational Ornithology Data
In this paper we demonstrate a practical approach to interaction detection on real data describing the abundance of different species of birds in the prairies east of the souther...
Daria Sorokina, Rich Caruana, Mirek Riedewald, Wes...
ICDM
2003
IEEE
100views Data Mining» more  ICDM 2003»
15 years 5 months ago
Tractable Group Detection on Large Link Data Sets
Discovering underlying structure from co-occurrence data is an important task in a variety of fields, including: insurance, intelligence, criminal investigation, epidemiology, hu...
Jeremy Kubica, Andrew W. Moore, Jeff G. Schneider
CCS
2007
ACM
15 years 6 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
IUI
2010
ACM
15 years 8 months ago
An adaptive calendar assistant using pattern mining for user preference modelling
In this paper, we present SmartCal, a calendar assistant that suggests appointment attributes, such as time, day, duration, etc., given any combination of initial user input attri...
Alfred Krzywicki, Wayne Wobcke, Anna Wong