Sciweavers

106 search results - page 11 / 22
» Mining Audit Data to Build Intrusion Detection Models
Sort
View
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
14 years 4 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 12 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
IDEAL
2009
Springer
14 years 2 months ago
Improving Energy Efficiency in Buildings Using Machine Intelligence
Improving the detection of thermal insulation in buildings –which includes the development of models for heating and ventilation processes and fabric gain - could significantly i...
Javier Sedano, José Ramón Villar, Le...
KDD
2004
ACM
285views Data Mining» more  KDD 2004»
14 years 29 days ago
Effective localized regression for damage detection in large complex mechanical structures
In this paper, we propose a novel data mining technique for the efficient damage detection within the large-scale complex mechanical structures. Every mechanical structure is defi...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...