Sciweavers

1274 search results - page 37 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 11 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
ICDM
2007
IEEE
147views Data Mining» more  ICDM 2007»
14 years 16 days ago
Improving Knowledge Discovery in Document Collections through Combining Text Retrieval and Link Analysis Techniques
In this paper, we present Concept Chain Queries (CCQ), a special case of text mining in document collections focusing on detecting links between two topics across text documents. ...
Wei Jin, Rohini K. Srihari, Hung Hay Ho, Xin Wu
KDD
2012
ACM
164views Data Mining» more  KDD 2012»
11 years 11 months ago
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs
Blockmodelling is an important technique for decomposing graphs into sets of roles. Vertices playing the same role have similar patterns of interactions with vertices in other rol...
Jeffrey Chan, Wei Liu, Christopher Leckie, James B...
ICDM
2003
IEEE
225views Data Mining» more  ICDM 2003»
14 years 1 months ago
Combining the web content and usage mining to understand the visitor behavior in a web site
A web site is a semi structured collection of different kinds of data, whose motivation is show relevant information to visitor and by this way capture her/his attention. Understa...
Juan D. Velásquez, Hiroshi Yasuda, Terumasa...
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
14 years 9 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo