Search
Search Results
-
Anomaly detection of policies in distributed firewalls using data log analysis
A distributed firewall is a security application that monitors and controls traffic on an organization’s network. While centralized firewalls are...
-
Policies and metrics for schedulers in cloud data-centers using CloudSim simulator
Today’s cloud technology consumers must address escalating computing and storage demands for services and applications. However, decision-making on...
-
Offline Mining of Microservice-Based Architectures (Extended Version)
Designing applications adhering to the key design principles of microservice-based architectures (MSAs) enables fully exploiting the potentials of...
-
Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm
Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is...
-
Data Mining Based Method for Integrating Online English SPOC Curriculum Resources
In order to improve the integration effect of English SPOC course resources and improve students’ English grades, this article proposes an online... -
Ethics in the mining of software repositories
Research in Mining Software Repositories (MSR) is research involving human subjects, as the repositories usually contain data about developers’ and...
-
Efficient Pruning Strategy for Mining High Utility Quantitative Itemsets
High Utility Quantitative Itemset Mining (HUQIM), which is an extension of the original High Utility Itemset Mining (HUIM), has become an important... -
Conclusion stability for natural language based mining of design discussions
Developer discussions range from in-person hallway chats to comment chains on bug reports. Being able to identify discussions that touch on software...
-
Identifying high-risk over-entitlement in access control policies using fuzzy logic
Analysing access control policies is an essential process for ensuring over-prescribed permissions are identified and removed. This is a...
-
SPAC: Scalable Pattern Approximate Counting in Graph Mining
Pattern counting is a crucial task in graph pattern mining. Accurate counting is not affordable as the datasets grow larger and larger, and... -
Enterprise Strategic Financing Risk Management Auxiliary Education System Based on Data Mining
In order to ensure the use effect of enterprise strategic financing risk management auxiliary education system, an enterprise strategic financing... -
An Association Rule Mining-Based Framework for the Discovery of Anomalous Behavioral Patterns
The identification of different risks and threats has become a top priority for organizations in recent years. Various techniques in both data and... -
Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies
Although being well-adopted and in widespread use, attribute-based access control (ABAC) remains a hard-to-master security paradigm in application... -
Analysis of the Online Home Consumption Database Based on Data Mining
In current times where there are smart devices for households, and that apart from having different functions that are helpful in daily household... -
Resource Allocation Optimization in Business Processes Supported by Reinforcement Learning and Process Mining
Resource allocation to execute business processes is increasingly crucial for organizations. As the cost of executing process tasks relies on several... -
A survey on the use of data and opinion mining in social media to political electoral outcomes prediction
Election polls are the de facto mechanisms to predict political outcomes. Traditionally, they are conducted with personal interviews and...
-
Behind the scenes of educational data mining
Research based on educational data mining conducted at academic institutions is often limited by the institutional policy with regard to the type of...
-
Synthesising Reinforcement Learning Policies Through Set-Valued Inductive Rule Learning
Today’s advanced Reinforcement Learning algorithms produce black-box policies, that are often difficult to interpret and trust for a person. We... -
The Ethics of Sharing: Privacy, Data, and Common Goods
Given the concerns about big tech’s hoarding of data, creation of profiles, mining of data, and extrapolation of new knowledge from their data...
-
Credit Risk Models in the Mexican Context Using Machine Learning
The Default Rate is related to the period of the economic cycle in which they are observed, during expansion periods of the economy the default rate...