Sciweavers

1274 search results - page 64 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 3 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
FLAIRS
2010
13 years 11 months ago
Visual Object Detection using Frequent Pattern Mining
Object search in a visual scene is a highly challenging and computationally intensive task. Most of the current object detection techniques extract features from images for classi...
Yousuf Aboobaker Sait, Balaraman Ravindran
CIDM
2009
IEEE
14 years 3 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
KDD
2003
ACM
192views Data Mining» more  KDD 2003»
14 years 9 months ago
Efficient elastic burst detection in data streams
Burst detection is the activity of finding abnormal aggregates in data streams. Such aggregates are based on sliding windows over data streams. In some applications, we want to mo...
Yunyue Zhu, Dennis Shasha
PAKDD
2004
ACM
137views Data Mining» more  PAKDD 2004»
14 years 2 months ago
Fast and Light Boosting for Adaptive Mining of Data Streams
Supporting continuous mining queries on data streams requires algorithms that (i) are fast, (ii) make light demands on memory resources, and (iii) are easily to adapt to concept dr...
Fang Chu, Carlo Zaniolo