Sciweavers

2236 search results - page 321 / 448
» Intrusion detection techniques and approaches
Sort
View
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 9 months ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
ESWA
2006
161views more  ESWA 2006»
13 years 9 months ago
Automated trend analysis of proteomics data using an intelligent data mining architecture
Proteomics is a field dedicated to the analysis and identification of proteins within an organism. Within proteomics, two-dimensional electrophoresis (2-DE) is currently unrivalle...
James Malone, Kenneth McGarry, Chris Bowerman
SPIN
2010
Springer
13 years 7 months ago
Context-Enhanced Directed Model Checking
Directed model checking is a well-established technique to efficiently tackle the state explosion problem when the aim is to find error states in concurrent systems. Although dir...
Martin Wehrle, Sebastian Kupferschmid
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
14 years 11 months ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi