Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Various data mining methods have been developed last few years for hepatitis study using a large temporal and relational database given to the research community. In this work we i...
Tu Bao Ho, Canh Hao Nguyen, Saori Kawasaki, Si Qua...
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
The discovery of emerging patterns (EPs) is a descriptive data mining task defined for pre-classified data. It aims at detecting patterns which contrast two classes and has been ...
Annalisa Appice, Michelangelo Ceci, Carlo Malgieri...
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...