Overview on Implementation of Various Hybrid Techniques in Information Management
Keywords:
Data Mining, Security Information Event Management System.Abstract
This paper gives an overview of data mining field security information event management system. We will see how various data mining techniques can be used in security information and event management system to enhance the capabilities of the system.
References
- I. K. R. Rao, “Data Mining and Clustering Techniques,” DRTC Workshop on Semantic Web, DRTC, Bangalore, paperk, pp. 1-1, 8th – 10th December, 2003.
- J. W. Seifert, “Data Mining and Homeland Security: An Overview,” CRS Report, pp. 1-1, Jan. 2007.
- M. S. Chen and J. H. Philip, “Data Mining: An Overview from a Database Perspective,” IEEE Trans on knowledge and data engineering, vol. 8, no. 6, pp. 1-1, Dec 1996.
- S. Yuan and C. Zou, “The Security Operations Center Based on Correlation Analysis.”
- E. E. Eljadi and Z. A. Othman, “Anomaly Detection for PTM's Network Traffic Using Association Rule,” in Proc. of 2011 3rd Conference on Data Mining and Optimization DMO, June 2011
- R. Agrawal and Srikant, “Fast Algorithms for Mining Association Rules,” in Proceeding of the 20th VLDB Conference Santiago,1994
- J. Han and M. Kamber, “Data Mining Concepts and Techniques. Second Edition,” The Morgan Kaufmann Series in Data Management Systems.
- C. Rudin, B. Letham, A. S. Aouissi, E. Kogan, and D. Madigan, Sequential Event Prediction with Association Rules.
Downloads
Published
2018-04-30
Issue
Section
Research Articles
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
[1]
Siddharth Arora, Ms. Priya "Overview on Implementation of Various Hybrid Techniques in Information Management" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099,
Volume 4, Issue 7, pp.809-815, March-April-2018.