Search For:

Displaying 1-4 out of 4 total
Multi-Stage Classification
Found in: Data Mining, IEEE International Conference on
By Ted E. Senator
Issue Date:November 2005
pp. 386-393
While much research has focused on methods for evaluating and maximizing the accuracy of classifiers either individually or in ensembles, little effort has been devoted to analyzing how classifiers are typically deployed in practice. In many domains, class...
Use of Domain Knowledge to Detect Insider Threats in Computer Activities
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By William T. Young,Henry G. Goldberg,Alex Memory,James F. Sartain,Ted E. Senator
Issue Date:May 2013
pp. 60-67
This paper reports the first set of results from a comprehensive set of experiments to detect realistic insider threat instances in a real corporate database of computer usage activity. It focuses on the application of domain knowledge to provide starting ...
On the efficacy of data mining for security applications
Found in: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD '09)
By Ted E. Senator
Issue Date:June 2009
pp. 75-83
Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several of the more common criticisms and analyzes some factors that bear on whether the criticisms are valid and/o...
Ongoing management and application of discovered knowledge in a large regulatory organization: a case study of the use and impact of NASD Regulation's Advanced Detection System (RADS)
Found in: Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '00)
By Ted E. Senator
Issue Date:August 2000
pp. 44-53
With over 800 million pages covering most areas of human endeavor, the World-wide Web is a fertile ground for data mining research to make a difference to the effectiveness of information search. Today, Web surfers access the Web through two dominant inter...