In the last ten years, with the explosion of the usage of Internet, network traffic analytics and data mining issues have taken primary importance. Generalized itemset mining is an established data mining technique which allows us to discover multiple-level correlations among data equipped with analyst-provided taxonomies. In this work, we address the discovery of a specific type of generalized itemsets, named misleading generalized itemsets (MGIs), which can be used to highlight anomalous situations in potentially large datasets. More specifically, MGIs are high-level patterns with a contrasting correlation type with respect to those of many of their descendant patterns according to the input taxonomy. This work proposes a new framework, n...
Abstract. Network traffic anomalies detection and characterization has been a hot topic of research ...
In the field of network security management, a number of recent researches have been dedicated to ne...
Abstract — Today network security, uptime and performance of network are important and serious issue...
In the last ten years, with the explosion of the usage of Internet, network traffic analytics and da...
In the era of smart cities huge data volumes are continuously generated and collected, thus promptin...
In the era of smart cities huge data volumes are continuously generated and collected, thus promptin...
Frequent generalized itemset mining is a data mining technique utilized to discover a high-level vie...
The NetMine framework allows the characterization of traffic data by means of data mining techniques...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
International audienceAnomaly extraction refers to automatically finding, in a large set of flows ob...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Syste...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
Abstract. Network traffic anomalies detection and characterization has been a hot topic of research ...
In the field of network security management, a number of recent researches have been dedicated to ne...
Abstract — Today network security, uptime and performance of network are important and serious issue...
In the last ten years, with the explosion of the usage of Internet, network traffic analytics and da...
In the era of smart cities huge data volumes are continuously generated and collected, thus promptin...
In the era of smart cities huge data volumes are continuously generated and collected, thus promptin...
Frequent generalized itemset mining is a data mining technique utilized to discover a high-level vie...
The NetMine framework allows the characterization of traffic data by means of data mining techniques...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
Association rule extraction is a widely used exploratory technique which has been exploited in diffe...
International audienceAnomaly extraction refers to automatically finding, in a large set of flows ob...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Syste...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
Abstract. Network traffic anomalies detection and characterization has been a hot topic of research ...
In the field of network security management, a number of recent researches have been dedicated to ne...
Abstract — Today network security, uptime and performance of network are important and serious issue...