-
1
-
-
0001882616
-
Fast algorithms for mining association rules
-
Morgan Kaufmann
-
Agrawal, R. and Srikant, R. 1994, Fast algorithms for mining association rules. In Proc, of the International Conference on Very Large Data Bases VLDB, Morgan Kaufmann, pp. 487-499.
-
(1994)
Proc, of the International Conference on Very Large Data Bases VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
5
-
-
0042421807
-
Statistical fraud detection: A review
-
Bolton, R.J. and Hand, D.J. 2002. Statistical fraud detection: A review. Statistical Science, 17:235-255.
-
(2002)
Statistical Science
, vol.17
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
6
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
Breunig, M.M., Kriegel, H.-P., Ng, R.T., and Sander, J. 2000. LOF: Identifying density-based local outliers. Proc. of the ACM SIGMOD International Conference on Management of Data.
-
(2000)
Proc. of the ACM SIGMOD International Conference on Management of Data
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
9
-
-
0034228041
-
ROCK: A robust clustering algorithm for categorical attributes
-
Guha, S., Rastogi, R., and Shim, K. 2000. ROCK: A robust clustering algorithm for categorical attributes. Information Systems, 25:345-366.
-
(2000)
Information Systems
, vol.25
, pp. 345-366
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
14
-
-
0034133513
-
Distance-based outliers: Algorithms and applications
-
Knorr, E., Ng, R., and Tucakov, V. 2000. Distance-based outliers: Algorithms and applications. VLDB Journal.
-
(2000)
VLDB Journal
-
-
Knorr, E.1
Ng, R.2
Tucakov, V.3
-
16
-
-
33644501924
-
A comparative study of outlier detection schemes for network intrusion detection
-
Lazarevic, A., Ertoz, L., Ozgur, A., Kumar, V., and Srivastava, J. 2003. A comparative study of outlier detection schemes for network intrusion detection. Proc. of the SIAM International Conference on Data Mining.
-
(2003)
Proc. of the SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Ozgur, A.3
Kumar, V.4
Srivastava, J.5
-
17
-
-
31844451490
-
Collaborative distributed intrusion detection
-
Department of Computer Science, Columbia University, New York
-
Locasto, M.E., Parekh, J.J., Stolfo, S.J., Keromytis, A.D., Malkin, T., and Misra, V. 2004. Collaborative distributed intrusion detection (Technical Report CUCS-012-04). Department of Computer Science, Columbia University, New York.
-
(2004)
Technical Report
, vol.CUCS-012-04
-
-
Locasto, M.E.1
Parekh, J.J.2
Stolfo, S.J.3
Keromytis, A.D.4
Malkin, T.5
Misra, V.6
-
19
-
-
77952369044
-
Towards nic-based intrusion detection
-
Otey, M., Parthasarathy, S., Ghoting, A., Li, G., Narravula, S., and Panda, D. 2003. Towards nic-based intrusion detection. Proc. of 9th annual ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
-
(2003)
Proc. of 9th Annual ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Otey, M.1
Parthasarathy, S.2
Ghoting, A.3
Li, G.4
Narravula, S.5
Panda, D.6
-
20
-
-
14344259796
-
Distributed deviation detection in sensor networks
-
Palpanas, T., Papadopoulos, D., Kalogeraki, V., and Gunopulos, D. 2003. Distributed deviation detection in sensor networks. SIGMOD Record, 32:77-82.
-
(2003)
SIGMOD Record
, vol.32
, pp. 77-82
-
-
Palpanas, T.1
Papadopoulos, D.2
Kalogeraki, V.3
Gunopulos, D.4
-
21
-
-
0345359208
-
LOCI: Fast outlier detection using the local correlation integral
-
Papadimitriou, S., Kitawaga, H., Gibbons, P.B., and Faloutsos, C. 2003. LOCI: Fast outlier detection using the local correlation integral. Proc. of the International Conference on Data Engineering.
-
(2003)
Proc. of the International Conference on Data Engineering
-
-
Papadimitriou, S.1
Kitawaga, H.2
Gibbons, P.B.3
Faloutsos, C.4
-
26
-
-
10044267389
-
Mining frequent itemsets in evolving databases
-
Veloso, A.A., Meira W., Jr., de Carvalho, M.B., Possas, B., Parthasarathy, S., and Zaki, M.J. 2002. Mining frequent itemsets in evolving databases. Proc. of the SIAM International Conference on Data Mining.
-
(2002)
Proc. of the SIAM International Conference on Data Mining
-
-
Veloso, A.A.1
Meira Jr., W.2
De Carvalho, M.B.3
Possas, B.4
Parthasarathy, S.5
Zaki, M.J.6
-
28
-
-
4644316998
-
Multi-database mining
-
Zhang, S., Wu, X., and Zhang, C. 2003a. Multi-database mining. IEEE Computational Intelligence Bulletin, 2:5-13.
-
(2003)
IEEE Computational Intelligence Bulletin
, vol.2
, pp. 5-13
-
-
Zhang, S.1
Wu, X.2
Zhang, C.3
-
29
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Zhang, Y. and Lee, W. 2000. Intrusion detection in wireless ad-hoc networks. Mobile Computing and Networking, pp. 275-283.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
30
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang, Y., Lee, W., and Huang, Y.-A. 2003b. Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9:545-556.
-
(2003)
Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|