Experimentation of Data Mining Technique for System's Security: A Comparative Study.
Ahmed Chaouki LokbaniAhmed LehirecheReda Mohamed HamouPublished in: ICSI (2) (2013)
Keyphrases
- data mining techniques
- cluster analysis
- intrusion detection
- data warehouse
- data mining
- association rules
- distributed data mining
- association rule mining
- apriori algorithm
- data mining methods
- data mining algorithms
- knowledge discovery
- information security
- fraud detection
- data mining technology
- log data
- intrusion detection system
- historical data
- data mining tools
- pattern mining
- access control
- distributed databases
- clustering algorithm
- data mining process
- data mining applications
- databases
- data sharing
- data sources
- data analysis
- privacy preserving data mining
- object recognition
- learning algorithm