Sciweavers

868 search results - page 55 / 174
» Using concept analysis to detect co-change patterns
Sort
View
133
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
186
Voted
USS
2010
15 years 1 months ago
BotGrep: Finding P2P Bots with Structured Graph Analysis
A key feature that distinguishes modern botnets from earlier counterparts is their increasing use of structured overlay topologies. This lets them carry out sophisticated coordina...
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Ma...
109
Voted
IJAR
2007
113views more  IJAR 2007»
15 years 3 months ago
Fuzzy clustering in parallel universes
We present an extension of the fuzzy c-Means algorithm, which operates simultaneously on different feature spaces—so-called parallel universes—and also incorporates noise det...
Bernd Wiswedel, Michael R. Berthold
157
Voted
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
15 years 1 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
138
Voted
IBPRIA
2007
Springer
15 years 9 months ago
False Positive Reduction in Breast Mass Detection Using Two-Dimensional PCA
In this paper we present a novel method for reducing false positives in breast mass detection. Our approach is based on using the Two-Dimensional Principal Component Analysis (2DPC...
Arnau Oliver, Xavier Lladó, Joan Mart&iacut...