[PDF][PDF] Security in data mining-a comprehensive survey

A Niranjan, A Nitish, PD Shenoy… - Global Journal of …, 2017 - researchgate.net
Data mining techniques, while allowing the individuals to extract hidden knowledge on one
hand, introduce a number of privacy threats on the other hand. In this paper, we study some …

[PDF][PDF] Anomaly intrusion detection techniques: a brief review

A Jain, B Verma, JL Rana - International Journal of Scientific & …, 2014 - academia.edu
In a broader sense detection of any unauthorized access of any information system is the
basic aim of any intrusion detection system. However due to cost considerations it is …

A modular machine-learning-based approach to improve tensile properties uniformity along hot dip galvanized steel strips for automotive applications

V Colla, S Cateni, A Maddaloni, A Vignali - Metals, 2020 - mdpi.com
The paper presents a machine learning-based system aimed at improving the homogeneity
of tensile properties of steel strips for automotive applications over their strip length in the …

Variable selection for efficient design of machine learning-based models: Efficient approaches for industrial applications

S Cateni, V Colla - Engineering Applications of Neural Networks: 17th …, 2016 - Springer
In many real word applications of neural networks and other machine learning approaches,
large experimental datasets are available, containing a huge number of variables, whose …

Cause and effect analysis in a real industrial context: study of a particular application devoted to quality improvement

S Cateni, V Colla, A Vignali… - Neural Advances in …, 2019 - Springer
This paper presents an analysis of the occurrence of ripple defects during Hot Deep
Galvanising of flat steel products, with a focus on the study on thick coils having low zinc …

Online anomaly detection in big data: The first line of defense against intruders

B Balasingam, P Mannaru, D Sidoti, K Pattipati… - Data Science and Big …, 2017 - Springer
We live in a world of abundance of information, but lack the ability to fully benefit from it, as
succinctly described by John Naisbitt in his 1982 book,“we are drowning in information, but …

[PDF][PDF] Intrusion Detection Using Data Mining Along Fuzzy Logic & Genetic Algorithms

R CHATURVEDI, B PATHIK… - Journal of Computer and …, 2018 - scholar.archive.org
Network security is of primary concerned now days for large organizations. The intrusion
detection systems (IDS) are becoming indispensable for effective protection against attacks …

[PDF][PDF] An Intrusion Detection System,(IDS) with Machine Learning (ML) Model Combining Hybrid Classifiers

M Arjunwadkar Narayan, TJ Parvat - connections - jmest.org
An Intrusion Detection System (IDS) with Machine Learning (ML) model Combining Hybrid
Classifiers ie Naïve Byes classifier and C 4.5 classifier is proposed for intrusion detection. In …

[PDF][PDF] Detecting Distributed Denial of Service Attack Using Data Mining Tool

A Kavitha, DAM Kumar - jset.sasapublications.com
The main idea behind for detecting distributed denial of service attack is that the engineer
works are accessible at all the times when the Intruder attack. The user's solution for …

[PDF][PDF] Pre-Processing For Neural Model Design In A Real Industrial Problem

S Cateni, V Colla, A Maddaloni, A Vignal - International Journal of …, 2019 - ijssst.info
In the last years, the artificial neural networks have been effectively applied to several
industrial problems in order to improve knowledge and get a deeper insight into correlations …