default search action
NATO ASI Mining Massive Data Sets for Security 2007: Gazzada (Varese), Italy
- Françoise Fogelman-Soulié, Domenico Perrotta, Jakub Piskorski, Ralf Steinberger:
Mining Massive Data Sets for Security - Advances in Data Mining, Search, Social Networks and Text Mining, and their Applications to Security, Proceedings of the NATO Advanced Study Institute on Mining Massive Data Sets for Security, Gazzada (Varese), Italy, 10-21 September 2007. NATO Science for Peace and Security Series - D: Information and Communication Security 19, IOS Press 2008, ISBN 978-1-58603-898-4
Data Mining
- Vladimir Vapnik, Akshay Vashist, Natalya Pavlovitch:
Learning using hidden information: Master-class learning. 3-14 - Léon Bottou, Olivier Bousquet:
Learning using Large Datasets. 15-26 - Isabelle Guyon:
Practical Feature Selection: from Correlation to Causality. 27-43 - Françoise Fogelman-Soulié, Erik Marcadé:
Industrial Mining of Massive Data Sets. 44-61 - Jason Weston:
Large-Scale Semi-Supervised Learning. 62-75 - Thierry Artières:
User Modeling and Machine Learning: A Survey. 76-84 - Gilles Gasso, Karina Zapien Arreola, Stéphane Canu:
Smoothness and sparsity tuning for Semi-Supervised SVM. 85-86 - Éric Gaussier, François Pacull:
Distributed Categorizer for Large Category Systems. 87-88 - Georges Hébrail:
Data stream management and mining. 89-102 - Marek A. Bednarczyk, Luca Bernardinello, Wieslaw Pawlowski, Lucia Pomello:
Modelling and Analysing Systems of Agents by Agent-aware Transition Systems. 103-112
Search
- Eric Glover:
The "Real World" Web Search Problem: Bridging The Gap Between Academic and Commercial Understanding of Issues and Methods. 115-129 - Barbara Poblete, Myra Spiliopoulou, Ricardo A. Baeza-Yates:
Website Privacy Preservation for Query Log Publishing. 130-133 - Marcin Sydow, Jakub Piskorski, Dawid Weiss, Carlos Castillo:
Fighting Web Spam. 134-153
Social Networks
- Dennis M. Wilkinson:
Emergent patterns in online coactivity. 157-168 - Jure Leskovec:
Diffusion and Cascading Behavior in Networks. 169-185 - Ronen Feldman:
Link Analysis in Networks of Entities. 186-197 - Pierre Borgnat, Eric Fleury, Jean-Loup Guillaume, Clémence Magnien, Céline Robardet, Antoine Scherrer:
Evolving networks. 198-203 - David Auber, Romain Bourqui, Guy Melançon:
Mining Networks through Visual Analytics: Incremental Hypothesis Building and Validation. 204-211 - Kiriaki Platanioti, Nicholas A. Heard, David J. Hand:
A Review of Anomaly Detection on Graphs. 212-213
Text Mining
- Ralf Steinberger, Bruno Pouliquen, Camelia Ignat:
Using language-independent rules to achieve high multilinguality in Text Mining. 217-240 - Gregory Grefenstette:
Mining the Web to Build a Complete, Large-Scale Language Model. 241-242 - Frizo Jansens, Wolfgang Glänzel, Bart De Moor:
Integrating Text Mining and Link Analysis. 243-244 - Arturo Montejo-Ráez, Luis Alfonso Ureña López, Miguel Ángel García Cumbreras, José Manuel Perea Ortega:
Using linguistic information as features for text categorization. 245-254
Security Applications
- David J. Hand, David John Weston:
Statistical Techniques for Fraud Detection, Prevention and Assessment. 257-270 - Marco Riani, Andrea Cerioli, Anthony C. Atkinson, Domenico Perrotta, Francesca Torti:
Fitting Mixtures of Regression Lines with the Forward Search. 271-286 - Ekrem Duman, Ayse Buyukkaya:
Money Laundering Detection Using Data Mining. 287-294 - Ralf Steinberger, Flavio Fuart, Erik van der Goot, Clive Best, Peter von Etter, Roman Yangarber:
Text Mining from the Web for Medical Intelligence. 295-310 - Hristo Tanev, Pinar Wennerberg:
Learning to Populate an Ontology of Politically Motivated Violent Events. 311-322 - Mark Last:
Filtering Multilingual Terrorist Content with Graph-Theoretic Classification Tools. 323-330 - Clive Best:
Open Source Intelligence. 331-344 - Nasrullah Memon, David L. Hicks:
Detecting Core Members in Terrorist Networks: A Case Study. 345-356 - Bruce Denby, Yacine Oussar, Iness Ahriz:
Geolocalisation in Cellular Telephone Networks. 357-365 - Pavel Laskov, Konrad Rieck, Klaus-Robert Müller:
Machine Learning for Intrusion Detection. 366-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.