Sciweavers

1274 search results - page 110 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 11 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
CIKM
2011
Springer
14 years 4 months ago
Detecting anomalies in graphs with numeric labels
This paper presents Yagada, an algorithm to search labelled graphs for anomalies using both structural data and numeric attributes. Yagada is explained using several security-rela...
Michael Davis, Weiru Liu, Paul Miller, George Redp...
BMCBI
2005
189views more  BMCBI 2005»
15 years 4 months ago
A sentence sliding window approach to extract protein annotations from biomedical articles
Background: Within the emerging field of text mining and statistical natural language processing (NLP) applied to biomedical articles, a broad variety of techniques have been deve...
Martin Krallinger, Maria Padron, Alfonso Valencia
ICDM
2003
IEEE
170views Data Mining» more  ICDM 2003»
15 years 9 months ago
Algorithms for Spatial Outlier Detection
A spatial outlier is a spatially referenced object whose non-spatial attribute values are significantly different from the values of its neighborhood. Identification of spatial ...
Chang-Tien Lu, Dechang Chen, Yufeng Kou
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
15 years 10 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...