Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach

S Khan, S Parkinson - Expert Systems with Applications, 2018 - Elsevier
Vulnerability assessment and security configuration activities are heavily reliant on expert
knowledge. This requirement often results in many systems being left insecure due to a lack …

[Retracted] Construction of Smart Higher Education Teaching Resources Using Data Analysis Technology in Unbalanced Data Environment

Y Luo - Journal of environmental and public health, 2022 - Wiley Online Library
The difficulty in gathering teaching resources presents challenges in the process of
developing instructional materials for smart higher education. This essay makes a research …

Discovering and utilising expert knowledge from security event logs

S Khan, S Parkinson - Journal of Information Security and Applications, 2019 - Elsevier
Vulnerability assessment and security configuration of computer systems is heavily
dependent on human experts, which are widely attributed as being in short supply. This can …

BruteSuppression: a size reduction method for Apriori rule sets

J Hills, A Bagnall, B de la Iglesia, G Richards - Journal of intelligent …, 2013 - Springer
Association rule mining can provide genuine insight into the data being analysed; however,
rule sets can be extremely large, and therefore difficult and time-consuming for the user to …

Analysis of the indonesian cyberbullying through data mining: the effective identification of cyberbullying through characteristics of messages

H Margono - 2019 - vuir.vu.edu.au
The use of social networks sites such as Facebook, Twitter, YouTube, Instagram, and
LinkedIn has increased rapidly in the last decade. It has been pointed out in the international …

[PDF][PDF] THAPE: A Tunable Hybrid Associative Predictive Engine Approach for Enhancing Rule Interpretability in Association Rule Learning for the Retail Sector.

M Alawadh, A Barnawi - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Association rule learning (ARL) is a widely used technique for discovering relationships
within datasets. However, it often generates excessive irrelevant or ambiguous rules …

Causal connections mining within security event logs

S Khan, S Parkinson - Proceedings of the 9th Knowledge Capture …, 2017 - dl.acm.org
Performing both security vulnerability assessment and configuration processes are heavily
reliant on expert knowledge. This requirement often results in many systems being left …

An improved HotSpot algorithm and its application to sandstorm data in Inner Mongolia

R Qing-dao-er-ji, R Pang… - Mathematical Problems in …, 2020 - Wiley Online Library
HotSpot is an algorithm that can directly mine association rules from real data. Aiming at the
problem that the support threshold in the algorithm cannot be set accurately according to the …

[PDF][PDF] Mining time-series data using discriminative subsequences

JFF Hills - 2014 - ueaeprints.uea.ac.uk
Time-series data is abundant, and must be analysed to extract usable knowledge. Local-
shape-based methods offer improved performance for many problems, and a …

Maximum Frequent Itemsets Discovery Algorithm Based on Granular Computing

H Chi, Z Liu - 2018 IEEE SmartWorld, Ubiquitous Intelligence & …, 2018 - ieeexplore.ieee.org
Different traditional frequent set discovery algorithms are applicable to data with different
characteristics. Based on the summary and understanding of the current status, this paper …