As stated in Chap. 4, to achieve an effective and applicable solution for a data mining problem, it is vital to thoroughly understand the problem at hand, in particular its constraints, environment and its problem specific knowledge. However, it is difficult to pinpoint the exact knowledge (i.e., attribute values) necessary for optimally implementing the proactive data mining method. In this chapter we present several scenarios over the security company’s case (Chap. 4) to demonstrate the general boundaries of the method.
|Name||SpringerBriefs in Electrical and Computer Engineering|
- Proactive data mining
- Sensitivity analysis