Sciweavers

1274 search results - page 111 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
IRI
2008
IEEE
15 years 10 months ago
Compound record clustering algorithm for design pattern detection by decision tree learning
Recovering design patterns applied in a system can help refactoring the system. Machine learning algorithms have been successfully applied in mining data patterns. However, one of...
Jing Dong, Yongtao Sun, Yajing Zhao
BMCBI
2005
110views more  BMCBI 2005»
15 years 4 months ago
Discovery of protein-protein interactions using a combination of linguistic, statistical and graphical information
Background: The rapid publication of important research in the biomedical literature makes it increasingly difficult for researchers to keep current with significant work in their...
James W. Cooper, Aaron Kershenbaum
ICDM
2010
IEEE
199views Data Mining» more  ICDM 2010»
15 years 2 months ago
Addressing Concept-Evolution in Concept-Drifting Data Streams
Abstract--The problem of data stream classification is challenging because of many practical aspects associated with efficient processing and temporal behavior of the stream. Two s...
Mohammad M. Masud, Qing Chen, Latifur Khan, Charu ...
WWW
2006
ACM
16 years 4 months ago
Probabilistic models for discovering e-communities
The increasing amount of communication between individuals in e-formats (e.g. email, Instant messaging and the Web) has motivated computational research in social network analysis...
Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, H...
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...