Sciweavers

122 search results - page 8 / 25
» Exploiting efficient data mining techniques to enhance intru...
Sort
View
DOLAP
2006
ACM
14 years 20 days ago
Enhanced mining of association rules from data cubes
On-line analytical processing (OLAP) provides tools to explore and navigate into data cubes in order to extract interesting information. Nevertheless, OLAP is not capable of expla...
Riadh Ben Messaoud, Sabine Loudcher Rabaséd...
RAID
1999
Springer
13 years 11 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
14 years 7 months ago
V-Miner: using enhanced parallel coordinates to mine product design and test data
Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
ACSAC
1999
IEEE
13 years 11 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
USENIX
2007
13 years 9 months ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...