Sciweavers

479 search results - page 49 / 96
» Intrusion Detection Based on Data Mining
Sort
View
ICDM
2008
IEEE
126views Data Mining» more  ICDM 2008»
15 years 6 months ago
Detecting Suspicious Behavior in Surveillance Images
We introduce a novel technique to detect anomalies in images. The notion of normalcy is given by a baseline of images, under the assumption that the majority of such images is nor...
Daniel Barbará, Carlotta Domeniconi, Zoran ...
KDD
2006
ACM
198views Data Mining» more  KDD 2006»
16 years 7 days ago
Event detection from evolution of click-through data
Previous efforts on event detection from the web have focused primarily on web content and structure data ignoring the rich collection of web log data. In this paper, we propose t...
Qiankun Zhao, Tie-Yan Liu, Sourav S. Bhowmick, Wei...
DIM
2009
ACM
15 years 4 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
AUSDM
2007
Springer
121views Data Mining» more  AUSDM 2007»
15 years 6 months ago
Using Corpus Analysis to Inform Research into Opinion Detection in Blogs
Opinion detection research relies on labeled documents for training data, either by assumptions based on the document’s origin or by using human assessors to categorise the docu...
Deanna J. Osman, John Yearwood, Peter Vamplew
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 4 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...