Sciweavers

118 search results - page 9 / 24
» Privacy-Preserving Data Mining through Knowledge Model Shari...
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 3 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
16 years 6 days ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
ENGL
2007
101views more  ENGL 2007»
14 years 11 months ago
Multiresolution Knowledge Mining using Wavelet Transform
— Most research in Knowledge Mining deal with the basic models like clustering, classification, regression, association rule mining and so on. In the process of quest for knowled...
R. Pradeep Kumar, P. Nagabhushan
93
Voted
CSE
2009
IEEE
15 years 6 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
DKE
2006
84views more  DKE 2006»
14 years 11 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...