Sciweavers

1274 search results - page 77 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
AMW
2010
13 years 10 months ago
Robust Clustering of Data Streams using Incremental Optimization
Discovering the patterns in evolving data streams is a very important and challenging task. In many applications, it is useful to detect the dierent patterns evolving over time and...
Basheer Hawwash, Olfa Nasraoui
SDM
2003
SIAM
156views Data Mining» more  SDM 2003»
13 years 10 months ago
Detection of Underrepresented Biological Sequences using Class-Conditional Distribution Models
A labeled sequence data set related to a certain biological property is often biased and, therefore, does not completely capture its diversity in nature. To reduce this sampling b...
Slobodan Vucetic, Dragoljub Pokrajac, Hongbo Xie, ...
CCS
2007
ACM
14 years 3 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
ICDM
2006
IEEE
122views Data Mining» more  ICDM 2006»
14 years 2 months ago
Latent Friend Mining from Blog Data
The rapid growth of blog (also known as “weblog”) data provides a rich resource for social community mining. In this paper, we put forward a novel research problem of mining t...
Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
DAWAK
2000
Springer
14 years 1 months ago
Enhancing Preprocessing in Data-Intensive Domains using Online-Analytical Processing
Abstract The application of data mining algorithms needs a goal-oriented preprocessing of the data. In practical applications the preprocessing task is very time consuming and has ...
Alexander Maedche, Andreas Hotho, Markus Wiese