Sensitivity Analysis of Proactive Data Mining

Haim Dahan, Shahar Cohen, Lior Rokach, Oded Maimon

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

As stated in Chap. 4, to achieve an effective and applicable solution for a data mining problem, it is vital to thoroughly understand the problem at hand, in particular its constraints, environment and its problem specific knowledge. However, it is difficult to pinpoint the exact knowledge (i.e., attribute values) necessary for optimally implementing the proactive data mining method. In this chapter we present several scenarios over the security company’s case (Chap. 4) to demonstrate the general boundaries of the method.
Original languageEnglish
Title of host publicationPROACTIVE DATA MINING WITH DECISION TREES
Pages63-85
ISBN (Electronic)978-1-4939-0539-3
DOIs
StatePublished - 15 Feb 2014

Publication series

NameSpringerBriefs in Electrical and Computer Engineering
ISSN (Print)2191-8112
ISSN (Electronic)2191-8120

Keywords

  • Proactive data mining
  • Sensitivity analysis

Fingerprint

Dive into the research topics of 'Sensitivity Analysis of Proactive Data Mining'. Together they form a unique fingerprint.

Cite this