Sciweavers

100 search results - page 12 / 20
» Mining specifications of malicious behavior
Sort
View
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
KDD
2003
ACM
233views Data Mining» more  KDD 2003»
14 years 8 months ago
SEWeP: using site semantics and a taxonomy to enhance the Web personalization process
Web personalization is the process of customizing a Web site to the needs of each specific user or set of users, taking advantage of the knowledge acquired through the analysis of...
Magdalini Eirinaki, Michalis Vazirgiannis, Iraklis...
KDD
2006
ACM
173views Data Mining» more  KDD 2006»
14 years 8 months ago
BLOSOM: a framework for mining arbitrary boolean expressions
We introduce a novel framework (BLOSOM) for mining (frequent) boolean expressions over binary-valued datasets. We organize the space of boolean expressions into four categories: p...
Lizhuang Zhao, Mohammed J. Zaki, Naren Ramakrishna...
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 7 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge
FLAIRS
2004
13 years 9 months ago
Personalization Using Hybrid Data Mining Approaches in E-Business Applications
Effective personalization is greatly demanded in highly heterogeneous and diverse e-commerce domain. In our approach we rely on the idea that an effective personalization techniqu...
Olena Parkhomenko, Yugyung Lee, Chintan Patel