Sciweavers

191 search results - page 32 / 39
» Automated Spyware Collection and Analysis
Sort
View
DAWAK
1999
Springer
13 years 11 months ago
Mining Interval Time Series
Data mining can be used to extensively automate the data analysis process. Techniques for mining interval time series, however, have not been considered. Such time series are commo...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...
HIPC
1999
Springer
13 years 11 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava
ACSAC
2004
IEEE
13 years 11 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
BMCBI
2006
123views more  BMCBI 2006»
13 years 7 months ago
SBEAMS-Microarray: database software supporting genomic expression analyses for systems biology
Background: The biological information in genomic expression data can be understood, and computationally extracted, in the context of systems of interacting molecules. The automat...
Bruz Marzolf, Eric W. Deutsch, Patrick Moss, David...
ICLP
2010
Springer
13 years 11 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López