Sciweavers

1274 search results - page 141 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SISW
2003
IEEE
15 years 9 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
WWW
2006
ACM
16 years 5 months ago
Detecting spam web pages through content analysis
In this paper, we continue our investigations of "web spam": the injection of artificially-created pages into the web in order to influence the results from search engin...
Alexandros Ntoulas, Marc Najork, Mark Manasse, Den...
SDM
2004
SIAM
162views Data Mining» more  SDM 2004»
15 years 5 months ago
Subspace Clustering of High Dimensional Data
Clustering suffers from the curse of dimensionality, and similarity functions that use all input features with equal relevance may not be effective. We introduce an algorithm that...
Carlotta Domeniconi, Dimitris Papadopoulos, Dimitr...
BMCBI
2006
169views more  BMCBI 2006»
15 years 4 months ago
Finding biological process modifications in cancer tissues by mining gene expression correlations
Background: Through the use of DNA microarrays it is now possible to obtain quantitative measurements of the expression of thousands of genes from a biological sample. This techno...
Giacomo Gamberoni, Sergio Storari, Stefano Volinia
ISSA
2004
15 years 5 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford