Sciweavers

479 search results - page 61 / 96
» Intrusion Detection Based on Data Mining
Sort
View
SDM
2004
SIAM
253views Data Mining» more  SDM 2004»
15 years 1 months ago
Density-Connected Subspace Clustering for High-Dimensional Data
Several application domains such as molecular biology and geography produce a tremendous amount of data which can no longer be managed without the help of efficient and effective ...
Peer Kröger, Hans-Peter Kriegel, Karin Kailin...
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
15 years 5 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
KDD
2010
ACM
161views Data Mining» more  KDD 2010»
15 years 1 months ago
Mass estimation and its applications
This paper introduces mass estimation—a base modelling mechanism in data mining. It provides the theoretical basis of mass and an efficient method to estimate mass. We show that...
Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, Jame...
CCS
2010
ACM
15 years 11 hour ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
IPSN
2010
Springer
15 years 6 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...