Search Results

There are 28523 results for: content related to: Data mining techniques for information security applications

  1. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods

    Decision Sciences

    Volume 32, Issue 4, December 2001, Pages: 635–660, Dan Zhu, G. Premkumar, Xiaoning Zhang and Chao-Hsien Chu

    Version of Record online : 7 JUN 2007, DOI: 10.1111/j.1540-5915.2001.tb00975.x

  2. Data Mining Basics

    Data Warehousing Fundamentals for it Professionals, Second Edition, Second Edition

    Paulraj Ponniah, Pages: 429–460, 2010

    Published Online : 18 AUG 2010, DOI: 10.1002/9780470604137.ch17

  3. Application of data mining methods to efficient microwave active device modeling

    International Journal of RF and Microwave Computer-Aided Engineering

    Volume 23, Issue 5, September 2013, Pages: 539–548, Yavuz Cengiz

    Version of Record online : 11 OCT 2012, DOI: 10.1002/mmce.20687

  4. Data Mining Basics

    Data Warehousing Fundamentals: A Comprehensive Guide for IT Professionals

    Paulraj Ponniah, Pages: 399–427, 2002

    Published Online : 23 APR 2002, DOI: 10.1002/0471221627.ch17

  5. Data Mining Techniques for Segmentation

    Data Mining Techniques in CRM: Inside Customer Segmentation

    Konstantinos Tsiptsis, Antonios Chorianopoulos, Pages: 65–132, 2010

    Published Online : 20 JAN 2010, DOI: 10.1002/9780470685815.ch3

  6. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  7. Data-Mining Concepts

    Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition

    Mehmed Kantardzic, Pages: 1–25, 2011

    Published Online : 5 OCT 2011, DOI: 10.1002/9781118029145.ch1

  8. An Overview of Data Mining Techniques

    Data Mining Techniques in CRM: Inside Customer Segmentation

    Konstantinos Tsiptsis, Antonios Chorianopoulos, Pages: 17–64, 2010

    Published Online : 20 JAN 2010, DOI: 10.1002/9780470685815.ch2

  9. Data Mining Meets Grid Computing: Time to Dance?

    Data Mining Techniques in Grid Computing Environments

    Alberto Sánchez, Jesús Montes, Werner Dubitzky, Julio J. Valdés, María S. Pérez, Pedro de Miguel, Pages: 1–16, 2009

    Published Online : 22 JUN 2009, DOI: 10.1002/9780470699904.ch1

  10. Data stream mining in ubiquitous environments: state-of-the-art and current directions

    Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    Volume 4, Issue 2, March/April 2014, Pages: 116–138, Mohamed Medhat Gaber, João Gama, Shonali Krishnaswamy, João Bártolo Gomes and Frederic Stahl

    Version of Record online : 24 FEB 2014, DOI: 10.1002/widm.1115

  11. An incremental intrusion detection system using a new semi-supervised stream classification method

    International Journal of Communication Systems

    Fakhroddin Noorbehbahani, Ali Fanian, Rasoul Mousavi and Homa Hasannejad

    Version of Record online : 19 JUN 2015, DOI: 10.1002/dac.3002

  12. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  13. The Mining Data Mart

    Data Mining Techniques in CRM: Inside Customer Segmentation

    Konstantinos Tsiptsis, Antonios Chorianopoulos, Pages: 133–187, 2010

    Published Online : 20 JAN 2010, DOI: 10.1002/9780470685815.ch4

  14. Using data mining techniques to characterize participation in observational studies

    Journal of Evaluation in Clinical Practice

    Ariel Linden and Paul R. Yarnold

    Version of Record online : 25 JAN 2016, DOI: 10.1111/jep.12515

  15. Revisiting evolutionary algorithms in feature selection and nonfuzzy/fuzzy rule based classification

    Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    Volume 3, Issue 2, March/April 2013, Pages: 83–108, Satchidananda Dehuri and Ashish Ghosh

    Version of Record online : 20 FEB 2013, DOI: 10.1002/widm.1087

  16. A hybrid data mining metaheuristic for the p-median problem

    Statistical Analysis and Data Mining: The ASA Data Science Journal

    Volume 4, Issue 3, June 2011, Pages: 313–335, Alexandre Plastino, Richard Fuchshuber, Simone de L. Martins, Alex A. Freitas and Said Salhi

    Version of Record online : 29 MAR 2011, DOI: 10.1002/sam.10116

  17. Data mining in education

    Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    Volume 3, Issue 1, January/February 2013, Pages: 12–27, Cristobal Romero and Sebastian Ventura

    Version of Record online : 14 DEC 2012, DOI: 10.1002/widm.1075

  18. Advances in Data Mining

    Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition

    Mehmed Kantardzic, Pages: 328–384, 2011

    Published Online : 5 OCT 2011, DOI: 10.1002/9781118029145.ch12

  19. You have free access to this content
    A review of data mining applications in crime

    Statistical Analysis and Data Mining: The ASA Data Science Journal

    Volume 9, Issue 3, June 2016, Pages: 139–154, Hossein Hassani, Xu Huang, Emmanuel S. Silva and Mansi Ghodsi

    Version of Record online : 21 APR 2016, DOI: 10.1002/sam.11312

  20. Data Mining

    Standard Article

    Wiley Encyclopedia of Computer Science and Engineering

    Xindong Wu, Yan Zhang and Xingquan Zhu

    Published Online : 16 MAR 2009, DOI: 10.1002/9780470050118.ecse094