Sciweavers

1274 search results - page 59 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
WWW
2010
ACM
14 years 3 months ago
Large-scale bot detection for search engines
In this paper, we propose a semi-supervised learning approach for classifying program (bot) generated web search traffic from that of genuine human users. The work is motivated by...
Hongwen Kang, Kuansan Wang, David Soukal, Fritz Be...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 3 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
ASE
2011
13 years 10 days ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
IJCNN
2006
IEEE
14 years 2 months ago
Prototype based outlier detection
— Outliers refer to “minority” data that are different from most other data. They usually disturb data mining process. But, sometimes they provide valuable information. Thus,...
Seungtaek Kim, Sungzoon Cho
SDM
2012
SIAM
261views Data Mining» more  SDM 2012»
11 years 11 months ago
Combining Active Learning and Dynamic Dimensionality Reduction
To date, many active learning techniques have been developed for acquiring labels when training data is limited. However, an important aspect of the problem has often been neglect...
Mustafa Bilgic