Sciweavers

479 search results - page 86 / 96
» Intrusion Detection Based on Data Mining
Sort
View
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 5 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
100
Voted
MSR
2006
ACM
15 years 5 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
14 years 9 months ago
Towards Community Discovery in Signed Collaborative Interaction Networks
Abstract--We propose a framework for discovery of collaborative community structure in Wiki-based knowledge repositories based on raw-content generation analysis. We leverage topic...
Petko Bogdanov, Nicholas D. Larusso, Ambuj K. Sing...
AAMAS
2006
Springer
14 years 11 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
107
Voted
ICDIM
2006
IEEE
15 years 5 months ago
Investigating Web-Based Approaches to Revealing Prototypical Music Artists in Genre Taxonomies
— We present three general approaches to detecting prototypical entities in a given taxonomy and apply them to a music information retrieval (MIR) problem. More precisely, we try...
Markus Schedl, Peter Knees, Gerhard Widmer