Sciweavers

479 search results - page 58 / 96
» Intrusion Detection Based on Data Mining
Sort
View
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 6 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 1 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
16 years 6 days ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth
KDD
2002
ACM
286views Data Mining» more  KDD 2002»
16 years 6 days ago
Object Boundary Detection For Ontology-Based Image Classification
Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential f...
Lei Wang, Latifur Khan, Casey Breen
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
16 years 6 days ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan