Sciweavers

194 search results - page 21 / 39
» A Data Mining Framework for Building Intrusion Detection Mod...
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICMLA
2008
13 years 9 months ago
Detection of Sequential Outliers Using a Variable Length Markov Model
Mining for outliers in sequential databases is crucial to forward appropriate analysis of data. Therefore, many approaches for the discovery of such anomalies have been proposed. ...
Cécile Low-Kam, Anne Laurent, Maguelonne Te...
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 7 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
KDD
2004
ACM
157views Data Mining» more  KDD 2004»
14 years 1 months ago
On detecting space-time clusters
Detection of space-time clusters is an important function in various domains (e.g., epidemiology and public health). The pioneering work on the spatial scan statistic is often use...
Vijay S. Iyengar
RSFDGRC
2009
Springer
14 years 2 months ago
Fuzzy Sets and Rough Sets for Scenario Modelling and Analysis
Abstract. Both fuzzy set theory and rough set theory play an important role in data-driven, systems modelling and analysis. They have been successfully applied to building various ...
Qiang Shen