Detecting Scanners: Empirical Assessment on a 3G Network
Detecting Rule Inconsistencies in Symbiotic Simulations
Detecting Review Spam: Challenges and Opportunities
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Detecting Phishing Attempts with SAS®: Cisco IronPort® Email Log
Detecting Paraphrase in Indian Languages-Malayalam
Detecting Outliers Using PAM with Normalization Factor on Yeast Data
Detecting Outliers in High-Dimensional Datasets with Mixed Attributes
Detecting Outliers in Data streams using Clustering Algorithms
Detecting Non-compliant Consumers in Spatio
Detecting Medicaid Data Anomalies Using Data Mining Techniques
detecting malicious use with unlabelled data using clustering and
Detecting localized homogeneous anomalies over spatio
Detecting Internet Phishing Attacks Using Data Mining Methods
Detecting Interesting Instances
Detecting Inference Attacks using Association
Detecting Illicit Drug Usage on Twitter
Detecting Hidden Relations in Geographic Data
Detecting Group Differences: Mining Contrast Sets
Detecting Game Player Goals with Log Data
Detecting Financial Fraud Using Data Mining Techniques: A Decade