The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Model Identification Through Data Mining
Abstract
Four main general purpose approaches inferring knowledge from data are presented as a useful pool of at least partially complementary techniques also in the cyber intrusion identification context. In order to reduce the dimensionality of the problem, the most salient variables can be selected by cascading to a K-means a Divisive Partitioning of data orthogonal to the Principal Directions. A rule induction method based on logical circuits synthesis after proper binarization of the original variables proves to be also able to further prune redundant variables, besides identifying logical relationships among them in an understandable “if . then ..” form. Adaptive Bayesian networks are used to build a decision tree over the hierarchy of variables ordered by Minimum Description Length. Finally, Piece-Wise Affine Identification also provides a model of the dynamics of the process underlying the data, by detecting possible switches and changes of trends on the time course of the monitoring.
Related Content
Nuno Silva, Pedro Sousa, Miguel Mira da Silva.
© 2019.
19 pages.
|
Ioannis Routis, Mara Nikolaidou, Nancy Alexopoulou.
© 2019.
21 pages.
|
Jeffrey S. Zanzig, Guillermo A. Francia III, Xavier P. Francia.
© 2019.
26 pages.
|
S. B. Goyal.
© 2019.
30 pages.
|
Maria João Ferreira, Fernando Moreira, Isabel Seruca.
© 2019.
24 pages.
|
Agostino Poggi, Paolo Fornacciari, Gianfranco Lombardo, Monica Mordonini, Michele Tomaiuolo.
© 2019.
21 pages.
|
Rüdiger Pryss, Manfred Reichert.
© 2019.
26 pages.
|
|
|