Strategies for data stream mining method applied in anomaly detection
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Strategies for data stream mining method applied in anomaly detection
Authors
Keywords
Anomaly detection, Data stream, Clustering, Concept drift
Journal
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
Publisher
Springer Nature America, Inc
Online
2018-08-25
DOI
10.1007/s10586-018-2835-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Ensemble learning for data stream analysis: A survey
- (2017) Bartosz Krawczyk et al. Information Fusion
- How to adjust an ensemble size in stream data mining?
- (2017) Lena Pietruczuk et al. INFORMATION SCIENCES
- A clustering algorithm for stream data with LDA-based unsupervised localized dimension reduction
- (2017) Sirisup Laohakiat et al. INFORMATION SCIENCES
- Adaptive random forests for evolving data stream classification
- (2017) Heitor M. Gomes et al. MACHINE LEARNING
- A survey on data preprocessing for data stream mining: Current status and future directions
- (2017) Sergio Ramírez-Gallego et al. NEUROCOMPUTING
- A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification
- (2017) Bin Gu et al. IEEE Transactions on Neural Networks and Learning Systems
- Structural Minimax Probability Machine
- (2017) Bin Gu et al. IEEE Transactions on Neural Networks and Learning Systems
- A comparison study of clustering algorithms for microblog posts
- (2016) Lin Li et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
- (2016) Zhangjie Fu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A survey of cloud-based network intrusion detection analysis
- (2016) Nathan Keegan et al. Human-centric Computing and Information Sciences
- KDVEM : a k -degree anonymity with vertex and edge modification algorithm
- (2015) Tinghuai Ma et al. COMPUTING
- Ensemble Online Classifier Based on the One-Class Base Classifiers for Mining Data Streams
- (2015) Ireneusz Czarnowski et al. CYBERNETICS AND SYSTEMS
- Selective scalable secret image sharing with verification
- (2015) Jung-San Lee et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Incremental Support Vector Learning for Ordinal Regression
- (2015) Bin Gu et al. IEEE Transactions on Neural Networks and Learning Systems
- Personalized fitting recommendation based on support vector regression
- (2015) Weimin Li et al. Human-centric Computing and Information Sciences
- The BAU GIS system using open source mapwindow
- (2015) Balqies Sadoun et al. Human-centric Computing and Information Sciences
- A survey on concept drift adaptation
- (2014) João Gama et al. ACM COMPUTING SURVEYS
- An enhanced fall detection system for elderly person monitoring using consumer home networks
- (2014) Jin Wang et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps
- (2014) Emiro de la Hoz et al. KNOWLEDGE-BASED SYSTEMS
- Data stream clustering
- (2013) Jonathan A. Silva et al. ACM COMPUTING SURVEYS
- A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
- (2010) Gang Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now