Sciweavers

956 search results - page 14 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
CIKM
2003
Springer
14 years 1 months ago
Question answering from the web using knowledge annotation and knowledge mining techniques
We present a strategy for answering fact-based natural language questions that is guided by a characterization of realworld user queries. Our approach, implemented in a system cal...
Jimmy J. Lin, Boris Katz
ADBIS
2007
Springer
207views Database» more  ADBIS 2007»
14 years 2 months ago
Applying User Profile Ontology for Mining Web Site Adaptation Recommendations
The Internet consists of web sites that employ different kinds of structures as the backbone of their build-up. However, users are browsing the web according to its content, regard...
Tarmo Robal, Ahto Kalja
JIPS
2010
195views more  JIPS 2010»
13 years 3 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...
WPES
2003
ACM
14 years 1 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...