Sciweavers

6431 search results - page 73 / 1287
» Model Building by Resolution
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 6 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
186
Voted
CVPR
2009
IEEE
16 years 9 months ago
D - Clutter: Building object model library from unsupervised segmentation of cluttered scenes
Autonomous systems which learn and utilize a limited visual vocabulary have wide spread applications. Enabling such systems to segment a set of cluttered scenes into objects is ...
Chandra Kambhamettu, Dimitris N. Metaxas, Gowri So...
200
Voted
SIGSOFT
2011
ACM
14 years 9 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
98
Voted
MOBILWARE
2009
ACM
15 years 9 months ago
Building a Personal Symbolic Space Model from GSM CellID Positioning Data
Filipe Meneses, Adriano J. C. Moreira