Sciweavers

479 search results - page 8 / 96
» Intrusion Detection Based on Data Mining
Sort
View
ICDCSW
2005
IEEE
15 years 5 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICDM
2007
IEEE
111views Data Mining» more  ICDM 2007»
15 years 6 months ago
Change-Point Detection in Time-Series Data Based on Subspace Identification
Yoshinobu Kawahara, Takehisa Yairi, Kazuo Machida
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
16 years 9 days ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
ICMLA
2004
15 years 1 months ago
Outlier detection and evaluation by network flow
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Ying Liu, Alan P. Sprague
JCP
2006
173views more  JCP 2006»
14 years 12 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar