Sciweavers

1274 search results - page 40 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 9 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
IEEEARES
2010
IEEE
14 years 1 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
KDD
2008
ACM
234views Data Mining» more  KDD 2008»
14 years 9 months ago
Angle-based outlier detection in high-dimensional data
Detecting outliers in a large set of data objects is a major data mining task aiming at finding different mechanisms responsible for different groups of objects in a data set. All...
Hans-Peter Kriegel, Matthias Schubert, Arthur Zime...
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ICDM
2010
IEEE
168views Data Mining» more  ICDM 2010»
13 years 6 months ago
Anomaly Detection Using an Ensemble of Feature Models
We present a new approach to semi-supervised anomaly detection. Given a set of training examples believed to come from the same distribution or class, the task is to learn a model ...
Keith Noto, Carla E. Brodley, Donna K. Slonim