Sciweavers

345 search results - page 29 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 7 days ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
ICDM
2010
IEEE
168views Data Mining» more  ICDM 2010»
13 years 5 months ago
Anomaly Detection Using an Ensemble of Feature Models
We present a new approach to semi-supervised anomaly detection. Given a set of training examples believed to come from the same distribution or class, the task is to learn a model ...
Keith Noto, Carla E. Brodley, Donna K. Slonim
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
14 years 2 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
CG
2007
Springer
13 years 7 months ago
Visual text mining using association rules
In many situations, individuals or groups of individuals are faced with the need to examine sets of documents to achieve understanding of their structure and to locate relevant in...
Alneu de Andrade Lopes, Roberto Pinho, Fernando Vi...
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
11 years 10 months ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...