Sciweavers

1274 search results - page 51 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 9 months ago
Detection of emerging space-time clusters
We propose a new class of spatio-temporal cluster detection methods designed for the rapid detection of emerging space-time clusters. We focus on the motivating application of pro...
Daniel B. Neill, Andrew W. Moore, Maheshkumar Sabh...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 28 days ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
14 years 10 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
PAKDD
2007
ACM
137views Data Mining» more  PAKDD 2007»
14 years 2 months ago
Contrast Set Mining Through Subgroup Discovery Applied to Brain Ischaemina Data
Abstract. Contrast set mining aims at finding differences between different groups. This paper shows that a contrast set mining task can be transformed to a subgroup discovery ta...
Petra Kralj, Nada Lavrac, Dragan Gamberger, Antoni...
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
13 years 6 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han