Sciweavers

868 search results - page 80 / 174
» Using concept analysis to detect co-change patterns
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 3 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
AAAI
2006
15 years 5 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
176
Voted
BIOINFORMATICS
2010
108views more  BIOINFORMATICS 2010»
15 years 2 months ago
Mass spectrometry data processing using zero-crossing lines in multi-scale of Gaussian derivative wavelet
Motivation: Peaks are the key information in Mass Spectrometry (MS) which has been increasingly used to discover diseases related proteomic patterns. Peak detection is an essentia...
Nha Nguyen, Heng Huang, Soontorn Oraintara, An P. ...
BMCBI
2005
117views more  BMCBI 2005»
15 years 3 months ago
Differentiation of regions with atypical oligonucleotide composition in bacterial genomes
Background: Complete sequencing of bacterial genomes has become a common technique of present day microbiology. Thereafter, data mining in the complete sequence is an essential st...
Oleg N. Reva, Burkhard Tümmler
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 8 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu