Actionable knowledge discovery and delivery

L Cao - Wiley Interdisciplinary Reviews: Data Mining and …, 2012 - Wiley Online Library
Actionable knowledge has been qualitatively and intensively studied in the social sciences.
Its marriage with data mining is only a recent story. On the one hand, data mining has been …

A log mining approach for process monitoring in SCADA

D Hadžiosmanović, D Bolzoni, PH Hartel - International Journal of …, 2012 - Springer
SCADA (supervisory control and data acquisition) systems are used for controlling and
monitoring industrial processes. We propose a methodology to systematically identify …

Data mining based network intrusion detection system: A database centric approach

R Chetan, DV Ashoka - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Network security technology has become crucial in protecting government and industry
computing infrastructure. Modern intrusion detection applications face complex …

Clustering of Snort alerts to identify patterns and reduce analyst workload

R Harang, P Guarino - MILCOM 2012-2012 IEEE Military …, 2012 - ieeexplore.ieee.org
Pattern-matching intrusion detection system (IDS) tools such as Snort are known to generate
an extremely large number of alerts. To address this problem, we present a greedy …

IDS alert classification model construction using decision support techniques

Y Zhang, S Huang, Y Wang - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Although many IDSs have been proposed to assist administrators in detecting intrusion,
false alarms are still huge and result in the difficulty of analysis. For this reason, we …

On the verification and validation of signature-based, network intrusion detection systems

F Massicotte, Y Labiche - 2012 IEEE 23rd International …, 2012 - ieeexplore.ieee.org
An Intrusion Detection System (IDS) protects computer networks against attacks and
intrusions in combination with firewalls and anti-virus systems. One class of IDS is called …

[PDF][PDF] 基于情节规则匹配的数据流预测

朱辉生, 汪卫, 施伯乐 - 软件学报, 2012 - jos.org.cn
提出了一种数据流预测算法Predictor. 该算法为每个待匹配的一般形式的情节规则分别使用了
一个自动机, 通过单遍扫描数据流来同时跟踪这些自动机的状态变迁, 以搜索每个规则前件最近 …

On Designing Privacy-Aware Data Upload Mechanism--Towards Information-Gathering System for Disasters

S Kiyomoto, Y Miyake, T Tanaka - 2012 IEEE 11th International …, 2012 - ieeexplore.ieee.org
A key issue for an organization that is responsible for disaster and emergency management
becomes how to gather reliable and useful information during a major disaster. We consider …

Visual analytic agent-based framework for intrusion alert analysis

R Shittu, A Healing, R Bloomfield… - … Conference on Cyber …, 2012 - ieeexplore.ieee.org
A large amount of research effort is focused on developing methods for correlating network
intrusion alerts, so as to better understand a network's current security state. The accuracy of …

Event correlation for operations management of largescale it systems

C Gupta - Proceedings of the 9th international conference on …, 2012 - dl.acm.org
In large scale systems IT systems, for the purpose of management, we have what are known
as" Networked Operations Centers" or NOCs. These NOCs are manned by support staff …