On the efficacy of data mining for security applications

  • Authors:
  • Ted E. Senator

  • Affiliations:
  • SAIC, Arlington, VA

  • Venue:
  • Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several of the more common criticisms and analyzes some factors that bear on whether the criticisms are valid and/or can be overcome by appropriate design and use of the data mining application.