Sciweavers

106 search results - page 16 / 22
» Mining Audit Data to Build Intrusion Detection Models
Sort
View
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 7 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
RSFDGRC
2009
Springer
14 years 2 months ago
Fuzzy Sets and Rough Sets for Scenario Modelling and Analysis
Abstract. Both fuzzy set theory and rough set theory play an important role in data-driven, systems modelling and analysis. They have been successfully applied to building various ...
Qiang Shen
COMAD
2009
13 years 8 months ago
Categorizing Concepts for Detecting Drifts in Stream
Mining evolving data streams for concept drifts has gained importance in applications like customer behavior analysis, network intrusion detection, credit card fraud detection. Se...
Sharanjit Kaur, Vasudha Bhatnagar, Sameep Mehta, S...
ICDM
2006
IEEE
122views Data Mining» more  ICDM 2006»
14 years 1 months ago
Latent Friend Mining from Blog Data
The rapid growth of blog (also known as “weblog”) data provides a rich resource for social community mining. In this paper, we put forward a novel research problem of mining t...
Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
14 years 12 days ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu