Sciweavers

2049 search results - page 75 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
74
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
15 years 11 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
72
Voted
HCI
2009
14 years 8 months ago
Visual Data Mining in Immersive Virtual Environment Based on 4K Stereo Images
In this study, super high-definition immersive visual data mining environment using 4K stereo projector was developed. In this system, data can be represented with high accuracy in...
Tetsuro Ogi, Yoshisuke Tateyama, So Sato
CSREASAM
2006
15 years 14 days ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
IPPS
2000
IEEE
15 years 2 months ago
Developing an Open Architecture for Performance Data Mining
Performance analysis of high performance systems is a difficult task. Current tools have proven successful in analysis tasks but their implementation is limited in several respects...
David B. Pierce, Diane T. Rover
IADIS
2008
15 years 15 days ago
Aggregation in Confidence-Based Concept Discovery for Multi-Relational Data Mining
Multi-relational data mining has become popular due to the limitations of propositional problem definition in structured domains and the tendency of storing data in relational dat...
Yusuf Kavurucu, Pinar Senkul, Ismail Hakki Toroslu