About
This Workshop brings together scientists and engineers interested in recent developments in exploiting Massive Data Sets. Emphasis is placed on available techniques and their application to security-critical applications. \ Today our world is awash in data and we live in an Information Society where every action leaves a trace, generating massive amounts of data. Recent scientific developments provide technologies to exploit these huge amounts of data and extract from it critical information. Used today in many commercial applications (marketing campaigns, user profiling and recommendations on e-commerce sites, web search,users communitiee...), these technologies can also be used for security-critical applications (fraud detection and money laundering, intrusions detection, intelligence gathering, terrorist networks detection, Web surveillance...).
It is the purpose of this workshop to review the various technologies available (data mining algorithms, social networks, crawling and indexing, text-mining, search engines, data streams) in the context of very large data sets.
The workshop will provide survey presentations & posters to help building a scientific community aware of security issues and techniques to solve them.
Videos
Opening and Closing session
Introduction to the Workshop
Nov 26, 2007 3099 views
Conclusion remarks
Dec 4, 2007 5011 views
Interviews
Interview with Clive Best
Dec 4, 2007 3563 views
Interview with Françoise Fogelman Soulié
Dec 4, 2007 4453 views
Lectures
Combining Information Retrieval and Information Extraction for Medical Intellige...
Dec 3, 2007 5690 views
Plastic Card Fraud Detection using Peer Group Analysis
Dec 3, 2007 10207 views
The "Real World" Web Search Problem
Dec 3, 2007 5998 views
Evolving Networks
Sep 21, 2008 3271 views
Security Applications of Web mining
Dec 4, 2007 6453 views
Modeling rare events: online advertisement targeting using machine learning and ...
Dec 3, 2007 8644 views
Diffusion and Cascading Behaviour in Networks
Nov 28, 2007 15301 views
Detecting Money Laundering Actions Using Data Mining and Expert Systems
Dec 3, 2007 10269 views
Approximation algorithms for k-anonymity and privacy preservation in query logs
Dec 3, 2007 7876 views
Learning with structured data - structured outputs
Nov 26, 2007 4596 views
Information Theo-retic and Alge-braic Methods for Network Anomaly Detection
Nov 26, 2007 4893 views
Automatic detection and aggregation of name variants from large multi-lingual do...
Nov 26, 2007 4033 views
User logs processing using machine learning techniques
Nov 26, 2007 5954 views
Web Spam Detection
Nov 28, 2007 10305 views
Open Source Intelligence
Dec 3, 2007 32980 views
Statistical techniques for fraud detection, prevention, and evaluation
Dec 3, 2007 42093 views
Website Privacy Preservation for Query Log Publishing
Nov 29, 2007 6114 views
Ontologies and Machine Learning
Nov 26, 2007 9771 views
CiteSeerX & ChemXSeer: Lessons for Cyber-infrastructure and Web
Dec 4, 2007 4268 views
Learning to Extract Security-related Event Information from Large News Collectio...
Dec 3, 2007 3546 views
Machine Learning for Intrusion Detection
Nov 26, 2007 17744 views
Large-Scale Semi-Supervised Learning
Nov 26, 2007 5849 views
Ontogen Software Demo
Nov 26, 2007 9129 views
Filtering Multi-Lingual Terrorist Content with Graph-Theoretic Classifi-cation T...
Nov 26, 2007 4102 views
Foundations of Statistical Learning Theory : Empirical Infe-rence in high-diment...
Dec 3, 2007 10297 views
Recognition and Disambiguation of geographical references in text
Nov 26, 2007 3340 views
Using linguistic information as features for text categorization
Nov 26, 2007 4875 views
Link Analysis and Text Mining : Current State of the Art and Applications for Co...
Dec 3, 2007 10676 views
Mining Networks through Visual Analytics:
Nov 26, 2007 4349 views
The Security of Mobile Agent Systems
Jan 7, 2008 4267 views
Feature selection, fundamentals and applications
Dec 3, 2007 17120 views
Learning using Many Examples
Nov 26, 2007 5105 views
Inference and Learning with Networked Data
Jan 15, 2008 4916 views
Data stream management and mining
Nov 26, 2007 12097 views
Summarizing Data Stream's History
Nov 26, 2007 4403 views
Geolocalisation in Cellular Telephone Networks
Dec 3, 2007 6402 views
Fitting mixtures of regression lines with the forward search: application to clu...
Dec 3, 2007 4055 views
Emergent patterns in large social systems
Nov 26, 2007 4031 views
Mining Massive Data Sets
Nov 26, 2007 10065 views
