On the efficacy of data mining for security applications.
Ted E. SenatorPublished in: KDD Workshop on CyberSecurity and Intelligence Informatics (2009)
Keyphrases
- data mining
- malicious code detection
- intrusion detection
- preserving privacy
- information security
- homeland security
- decision support
- cyber security
- security requirements
- security issues
- data mining techniques
- knowledge discovery in databases
- real world
- machine learning
- data mining applications
- data analysis
- association rules
- data mining algorithms
- rough sets
- text mining
- previously unknown
- cyber attacks
- privacy issues
- computer science
- cluster analysis
- security threats
- security problems
- security level
- national security
- security systems
- critical infrastructure
- knowledge discovery
- security mechanisms
- sensitive data
- anomaly detection
- security policies
- web mining