Sciweavers

555 search results - page 9 / 111
» Performance Evaluation of Two Data Mining Techniques of Netw...
Sort
View
ISICA
2009
Springer
14 years 2 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
KDD
2003
ACM
243views Data Mining» more  KDD 2003»
14 years 8 months ago
Accurate decision trees for mining high-speed data streams
In this paper we study the problem of constructing accurate decision tree models from data streams. Data streams are incremental tasks that require incremental, online, and any-ti...
João Gama, Pedro Medas, Ricardo Rocha
ICDM
2008
IEEE
118views Data Mining» more  ICDM 2008»
14 years 2 months ago
Dirichlet Process Based Evolutionary Clustering
Evolutionary Clustering has emerged as an important research topic in recent literature of data mining, and solutions to this problem have found a wide spectrum of applications, p...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
KDD
2002
ACM
173views Data Mining» more  KDD 2002»
14 years 8 months ago
LumberJack: Intelligent Discovery and Analysis of Web User Traffic Composition
Web Usage Mining enables new understanding of user goals on the Web. This understanding has broad applications, and traditional mining techniques such as association rules have bee...
Ed Huai-hsin Chi, Adam Rosien, Jeffrey Heer
SIGCOMM
2010
ACM
13 years 7 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...