Detecting Remote Exploits Using Data Mining.
Mohammad M. MasudLatifur KhanBhavani M. ThuraisinghamXinran WangPeng LiuSencun ZhuPublished in: IFIP Int. Conf. Digital Forensics (2008)
Keyphrases
- data mining
- data mining methods
- data mining techniques
- knowledge discovery
- real time
- knowledge discovery in databases
- data mining applications
- association rules
- databases
- intrusion detection
- decision making
- feature selection
- application of data mining
- business applications
- automatic detection
- pattern mining
- data mining algorithms
- business intelligence
- data analysis
- expert systems
- information systems
- pattern discovery
- data visualization
- decision support
- real world
- previously unknown
- data preprocessing