1.

Record Nr.

UNINA9910809843503321

Titolo

Design and implementation of data mining tools / / M. Awad. [et al.]

Pubbl/distr/stampa

Boca Raton, Fla. : , : Auerbach Publications, , 2009

ISBN

0-367-38555-4

0-429-11670-5

1-282-11123-X

9786612111235

1-4200-4591-1

Descrizione fisica

1 online resource (276 p.)

Altri autori (Persone)

AwadM (Mamoun)

Disciplina

005.74

Soggetti

Data mining

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"An Auerbach book."

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front cover; Dedication; Contents; Preface; About the Authors; Acknowledgments; Chapter 1. Introduction; Chapter 2. Data Mining Techniques; Chapter 3. Data Mining Applications; Chapter 4. Data Mining for Security Applications; Chapter 5. Dynamic Growing Self-Organizing Tree Algorithm; Chapter 6. Data Reduction Using Hierarchical Clustering and Rocchio Bundling; Chapter 7. Intrusion Detection Results; Chapter 8. Web Data Management and Mining; Chapter 9. Effective Web Page Prediction Using Hybrid Model; Chapter 10. Multiple Evidence Combination for WWW Prediction

Chapter 11. WWW Prediction ResultsChapter 12. Multimedia Data Management and Mining; Chapter 13. Image Classification Models; Chapter 14. Subspace Clustering and Automatic Image Annotation; Chapter 15. Enhanced Weighted Feature Selection; Chapter 16. Image Classification and Performance Analysis; Chapter 17. Summary and Directions; APPENDIX A; Data Management Systems: Developments and Trends; Index; Back cover

Sommario/riassunto

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own



research work, the book takes a practical approach to the subject.The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines v