Sciweavers

479 search results - page 78 / 96
» Intrusion Detection Based on Data Mining
Sort
View
ICDM
2003
IEEE
95views Data Mining» more  ICDM 2003»
15 years 5 months ago
Evolutionary Gabor Filter Optimization with Application to Vehicle Detection
Abstract—Despite the considerable amount of research work on the application of Gabor filters in pattern classification, their design and selection have been mostly done on a t...
Zehang Sun, George Bebis, Ronald Miller
CIKM
2010
Springer
14 years 10 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
IPPS
2007
IEEE
15 years 6 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
KDD
2009
ACM
170views Data Mining» more  KDD 2009»
16 years 9 days ago
Genre-based decomposition of email class noise
Corruption of data by class-label noise is an important practical concern impacting many classification problems. Studies of data cleaning techniques often assume a uniform label ...
Aleksander Kolcz, Gordon V. Cormack
ADMA
2008
Springer
123views Data Mining» more  ADMA 2008»
15 years 6 months ago
Supporting Customer Retention through Real-Time Monitoring of Individual Web Usage
Customer retention is crucial for any company relying on a regular client base. One way to approach this problem is to analyse actual user behaviour and take proper actions based o...
Peter Hofgesang, Jan Peter Patist