Sciweavers

1274 search results - page 119 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ACCV
2010
Springer
15 years 9 days ago
Stream-based Active Unusual Event Detection
We present a new active learning approach to incorporate human feedback for on-line unusual event detection. In contrast to most existing unsupervised methods that perform passiv...
Chen Change Loy, Tao Xiang, Shaogang Gong
146
Voted
IADIS
2008
15 years 5 months ago
Towards Mining for Influence in a Multi Agent Environment
Multi agent learning systems pose an interesting set of problems: in large environments agents may develop localised behaviour patterns that are not necessarily optimal; in a pure...
Robert Logie, Jon G. Hall, Kevin G. Waugh
ISCC
2006
IEEE
169views Communications» more  ISCC 2006»
15 years 10 months ago
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Vasilis Chatzigiannakis, Symeon Papavassiliou, Mar...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 4 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 4 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...