TY - GEN
T1 - Data mining for security applications
AU - Thuraisingham, Bhavani
AU - Khan, Latifur
AU - Masud, Mohammad M.
AU - Hamlen, Kevin W.
PY - 2008
Y1 - 2008
N2 - In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
AB - In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
UR - http://www.scopus.com/inward/record.url?scp=63149160678&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=63149160678&partnerID=8YFLogxK
U2 - 10.1109/EUC.2008.62
DO - 10.1109/EUC.2008.62
M3 - Conference contribution
AN - SCOPUS:63149160678
SN - 9780769534923
T3 - Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
SP - 585
EP - 589
BT - Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
T2 - 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Y2 - 17 December 2008 through 20 December 2008
ER -