Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data.
Danielle ChrunMichel CukierGerry SneeringerPublished in: SAFECOMP (2008)
Keyphrases
- data sets
- database
- statistical analysis
- data collection
- image data
- complex data
- data objects
- synthetic data
- data processing
- knowledge discovery
- data sources
- high quality
- training data
- data analysis
- data structure
- computer systems
- data quality
- social media
- end users
- mobile devices
- relational databases
- small number
- data management
- labeled data
- experimental data
- information systems
- machine learning