Sciweavers

1244 search results - page 135 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
NIPS
1998
15 years 5 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
16 years 4 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
154
Voted
ICPR
2010
IEEE
15 years 9 months ago
Boolean Combination of Classifiers in the ROC Space
Using Boolean AND and OR functions to combine the responses of multiple one- or two-class classifiers in the ROC space may significantly improve performance of a detection system o...
Wael Khreich, Eric Granger, Ali Miri, R. Sabourin
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 5 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
TIT
2010
125views Education» more  TIT 2010»
14 years 11 months ago
Target detection via network filtering
A method of `network filtering' has been proposed recently to detect the effects of certain external perturbations on the interacting members in a network. However, with larg...
Shu Yang, Eric D. Kolaczyk