Sciweavers

1274 search results - page 68 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
PKDD
2004
Springer
138views Data Mining» more  PKDD 2004»
14 years 2 months ago
Combining Multiple Clustering Systems
Three methods for combining multiple clustering systems are presented and evaluated, focusing on the problem of finding the correspondence between clusters of different systems. ...
Constantinos Boulis, Mari Ostendorf
ICDE
2007
IEEE
209views Database» more  ICDE 2007»
14 years 3 months ago
Hierarchical Temporal Association Mining for Video Event Detection in Video Databases
With the proliferation of multimedia data and evergrowing requests for multimedia applications, new challenges are emerged for efficient and effective managing and accessing large...
Min Chen, Shu-Ching Chen, Mei-Ling Shyu
IMC
2005
ACM
14 years 2 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 8 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
KAIS
2008
150views more  KAIS 2008»
13 years 8 months ago
A survey on algorithms for mining frequent itemsets over data streams
The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of freq...
James Cheng, Yiping Ke, Wilfred Ng