Sciweavers

1274 search results - page 58 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ADMA
2009
Springer
246views Data Mining» more  ADMA 2009»
14 years 3 months ago
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
Image spam is a new trend in the family of email spams. The new image spams employ a variety of image processing technologies to create random noises. In this paper, we propose a s...
Yan Gao, Ming Yang, Alok N. Choudhary
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 9 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
IDEAL
2003
Springer
14 years 1 months ago
Experiences of Using a Quantitative Approach for Mining Association Rules
In recent years interest has grown in “mining” large databases to extract novel and interesting information. Knowledge Discovery in Databases (KDD) has been recognised as an em...
L. Dong, Christos Tjortjis
INCDM
2009
Springer
160views Data Mining» more  INCDM 2009»
14 years 3 months ago
Integrating Data Mining and Agent Based Modeling and Simulation
In this paper, we introduce an integration study which combines Data Mining (DM) and Agent Based Modeling and Simulation (ABMS). This study, as a new paradigm for DM/ABMS, is conce...
Omar Baqueiro, Yanbo J. Wang, Peter McBurney, Fran...
CN
2004
256views more  CN 2004»
13 years 8 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...