Sciweavers

100 search results - page 10 / 20
» Mining specifications of malicious behavior
Sort
View
GPEM
2010
134views more  GPEM 2010»
13 years 6 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
ICCS
2007
Springer
14 years 1 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
EDBTW
2006
Springer
13 years 11 months ago
NaviMoz: Mining Navigational Patterns in Portal Catalogs
Abstract. Portal Catalogs is a popular means of searching for information on the Web. They provide querying and browsing capabilities on data organized in a hierarchy, on a categor...
Eleni G. Christodoulou, Theodore Dalamagas, Timos ...
ICDM
2007
IEEE
199views Data Mining» more  ICDM 2007»
14 years 1 months ago
Discovering Structural Anomalies in Graph-Based Data
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder
IWPC
2002
IEEE
14 years 14 days ago
Mining System-User Interaction Traces for Use Case Models
While code understanding is the primary program comprehension activity, it is quite challenging to recognize the application requirements from code, since they have usually been o...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...