A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Data Mining for Security Applications
2008
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
doi:10.1109/euc.2008.62
dblp:conf/euc/ThuraisinghamKMH08
fatcat:4qwlyc4v3faqtgm6hbbwfuyooa