Sciweavers

345 search results - page 3 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
14 years 16 days ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
CSREASAM
2008
13 years 9 months ago
A Multi-Layered Approach to Botnet Detection
Robert F. Erbacher, Adele Cutler, Pranab Banerjee,...
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
14 years 1 months ago
An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning
This paper proposes a novel anomaly detection system for spacecrafts based on data mining techniques. It constructs a nonlinear probabilistic model w.r.t. behavior of a spacecraft ...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
CSREASAM
2006
13 years 9 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...