Sciweavers

479 search results - page 57 / 96
» Intrusion Detection Based on Data Mining
Sort
View
CIKM
2009
Springer
15 years 6 months ago
LoOP: local outlier probabilities
Many outlier detection methods do not merely provide the decision for a single data object being or not being an outlier but give also an outlier score or “outlier factor” sig...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
16 years 1 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 1 months ago
Trajectory Outlier Detection: A Partition-and-Detect Framework
Outlier detection has been a popular data mining task. However, there is a lack of serious study on outlier detection for trajectory data. Even worse, an existing trajectory outlie...
Jae-Gil Lee, Jiawei Han, Xiaolei Li
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 12 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
IJDE
2007
105views more  IJDE 2007»
14 years 11 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka