Sciweavers

145 search results - page 24 / 29
» Unsupervised Anomaly Detection in Network Intrusion Detectio...
Sort
View
MOBISYS
2008
ACM
15 years 9 months ago
The pothole patrol: using a mobile sensor network for road surface monitoring
This paper investigates an application of mobile sensing: detecting and reporting the surface conditions of roads. We describe a system and associated algorithms to monitor this i...
Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newto...
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
CDC
2008
IEEE
147views Control Systems» more  CDC 2008»
15 years 4 months ago
Clustering neural spike trains with transient responses
— The detection of transient responses, i.e. non– stationarities, that arise in a varying and small fraction of the total number of neural spike trains recorded from chronicall...
John D. Hunter, Jianhong Wu, John G. Milton
WWW
2010
ACM
15 years 4 months ago
Relational duality: unsupervised extraction of semantic relations between entities on the web
Extracting semantic relations among entities is an important first step in various tasks in Web mining and natural language processing such as information extraction, relation de...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
15 years 3 months ago
Summarization - Compressing Data into an Informative Representation
In this paper, we formulate the problem of summarization of a dataset of transactions with categorical attributes as an optimization problem involving two objective functions - co...
Varun Chandola, Vipin Kumar