Sciweavers

1274 search results - page 96 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
WWW
2010
ACM
15 years 11 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 5 months ago
Trajectory Outlier Detection: A Partition-and-Detect Framework
Outlier detection has been a popular data mining task. However, there is a lack of serious study on outlier detection for trajectory data. Even worse, an existing trajectory outlie...
Jae-Gil Lee, Jiawei Han, Xiaolei Li
ICDCSW
2007
IEEE
15 years 10 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 8 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
OTM
2010
Springer
15 years 2 months ago
A Hybrid Approach to Constructing Tag Hierarchies
Abstract. Folksonomies are becoming increasingly popular. They contain large amounts of data which can be mined and utilized for many tasks like visualization, browsing, informatio...
Geir Solskinnsbakk, Jon Atle Gulla