Sciweavers

1274 search results - page 33 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
14 years 1 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
CSREASAM
2008
13 years 10 months ago
A Multi-Layered Approach to Botnet Detection
Robert F. Erbacher, Adele Cutler, Pranab Banerjee,...
SAINT
2003
IEEE
14 years 1 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
14 years 2 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
PVLDB
2010
117views more  PVLDB 2010»
13 years 7 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...