Sciweavers

2953 search results - page 341 / 591
» A Feature Selection Technique based on Distributional Differ...
Sort
View
138
Voted
SKG
2006
IEEE
15 years 10 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
KDD
2008
ACM
234views Data Mining» more  KDD 2008»
16 years 5 months ago
Angle-based outlier detection in high-dimensional data
Detecting outliers in a large set of data objects is a major data mining task aiming at finding different mechanisms responsible for different groups of objects in a data set. All...
Hans-Peter Kriegel, Matthias Schubert, Arthur Zime...
135
Voted
MASCOTS
2010
15 years 6 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...
ASC
2007
16 years 3 months ago
A BDI Agent System for Credit Risk Assessment based on Fuzzy Logic
Credit risk has always been an important issue for banks and other financial intermediaries. A reliable and consistent computing system is necessary to simplify the decision mak...
S. Bonura, V. Morreale, G. Cammarata, F. Cantore,...
ACSAC
2005
IEEE
15 years 10 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning