Sciweavers

479 search results - page 56 / 96
» Intrusion Detection Based on Data Mining
Sort
View
KDD
2005
ACM
119views Data Mining» more  KDD 2005»
15 years 5 months ago
LIPED: HMM-based life profiles for adaptive event detection
In this paper, the proposed LIPED (LIfe Profile based Event Detection) employs the concept of life profiles to predict the activeness of event for effective event detection. A gro...
Chien Chin Chen, Meng Chang Chen, Ming-Syan Chen
LREC
2010
150views Education» more  LREC 2010»
15 years 1 months ago
Detection of Peculiar Examples using LOF and One Class SVM
This paper proposes the method to detect peculiar examples of the target word from a corpus. The peculiar example is regarded as an outlier in the given example set. Therefore we ...
Hiroyuki Shinnou, Minoru Sasaki
WWW
2010
ACM
15 years 6 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
ICIW
2009
IEEE
15 years 6 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
CORR
2008
Springer
192views Education» more  CORR 2008»
14 years 10 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...