Sciweavers

1274 search results - page 112 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
RAID
1999
Springer
15 years 8 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
KDD
1997
ACM
146views Data Mining» more  KDD 1997»
15 years 8 months ago
Density-Connected Sets and their Application for Trend Detection in Spatial Databases
1 Several clustering algorithms have been proposed for class identification in spatial databases such as earth observation databases. The effectivity of the well-known algorithms ...
Martin Ester, Hans-Peter Kriegel, Jörg Sander...
ICDM
2008
IEEE
99views Data Mining» more  ICDM 2008»
15 years 10 months ago
Finding Good Itemsets by Packing Data
The problem of selecting small groups of itemsets that represent the data well has recently gained a lot of attention. We approach the problem by searching for the itemsets that c...
Nikolaj Tatti, Jilles Vreeken
PPOPP
2003
ACM
15 years 9 months ago
Hybrid dynamic data race detection
We present a new method for dynamically detecting potential data races in multithreaded programs. Our method improves on the state of the art in accuracy, in usability, and in ove...
Robert O'Callahan, Jong-Deok Choi
IEEEVAST
2010
14 years 11 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen