Sciweavers

62 search results - page 9 / 13
» Database Intrusion Detection using Weighted Sequence Mining
Sort
View
NGC
2007
Springer
150views Communications» more  NGC 2007»
13 years 7 months ago
Exploiting Temporal Relations in Mining Hepatitis Data
Various data mining methods have been developed last few years for hepatitis study using a large temporal and relational database given to the research community. In this work we i...
Tu Bao Ho, Canh Hao Nguyen, Saori Kawasaki, Si Qua...
BMCBI
2005
152views more  BMCBI 2005»
13 years 7 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 7 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
BMCBI
2005
150views more  BMCBI 2005»
13 years 7 months ago
Discover protein sequence signatures from protein-protein interaction data
Background: The development of high-throughput technologies such as yeast two-hybrid systems and mass spectrometry technologies has made it possible to generate large protein-prot...
Jianwen Fang, Ryan J. Haasl, Yinghua Dong, Gerald ...