Sciweavers

76 search results - page 4 / 16
» Analysis of Firewall Policy Rules Using Data Mining Techniqu...
Sort
View
IEEEIAS
2009
IEEE
14 years 1 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
DASFAA
2006
IEEE
133views Database» more  DASFAA 2006»
14 years 24 days ago
Mining Spatio-temporal Association Rules, Sources, Sinks, Stationary Regions and Thoroughfares in Object Mobility Databases
Abstract. As mobile devices proliferate and networks become more locationaware, the corresponding growth in spatio-temporal data will demand analysis techniques to mine patterns th...
Florian Verhein, Sanjay Chawla
KDD
2002
ACM
145views Data Mining» more  KDD 2002»
14 years 7 months ago
Handling very large numbers of association rules in the analysis of microarray data
The problem of analyzing microarray data became one of important topics in bioinformatics over the past several years, and different data mining techniques have been proposed for ...
Alexander Tuzhilin, Gediminas Adomavicius
AISS
2010
171views more  AISS 2010»
13 years 1 months ago
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining
Computer programming is one of the most essential skills which each graduate has to acquire. However, there are reports that they are unable to write a program well. Researches in...
Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Waha...
KDD
1997
ACM
96views Data Mining» more  KDD 1997»
13 years 11 months ago
Using General Impressions to Analyze Discovered Classification Rules
One of the important problems in data mining is the evaluation of subjective interestingness of the discovered rules. Past research has found that in many real-life applications i...
Bing Liu, Wynne Hsu, Shu Chen