Sciweavers

1274 search results - page 46 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SAC
2009
ACM
15 years 10 months ago
Combining statistics and semantics via ensemble model for document clustering
Incorporating background knowledge into data mining algorithms is an important but challenging problem. Current approaches in semi-supervised learning require explicit knowledge p...
Samah Jamal Fodeh, William F. Punch, Pang-Ning Tan
FLAIRS
2004
15 years 5 months ago
Personalization Using Hybrid Data Mining Approaches in E-Business Applications
Effective personalization is greatly demanded in highly heterogeneous and diverse e-commerce domain. In our approach we rely on the idea that an effective personalization techniqu...
Olena Parkhomenko, Yugyung Lee, Chintan Patel
139
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
126
Voted
DAWAK
2005
Springer
15 years 9 months ago
A Tree Comparison Approach to Detect Changes in Data Warehouse Structures
Abstract. We present a technique for discovering and representing changes between versions of data warehouse structures. We select a tree comparison algorithm, adapt it for the par...
Johann Eder, Christian Koncilia, Karl Wiggisser
IAT
2006
IEEE
15 years 10 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath