Sensitivity Analysis of Proactive Data Mining

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Abstract

    As stated in Chap. 4, to achieve an effective and applicable solution for a data mining problem, it is vital to thoroughly understand the problem at hand, in particular its constraints, environment and its problem specific knowledge. However, it is difficult to pinpoint the exact knowledge (i.e., attribute values) necessary for optimally implementing the proactive data mining method. In this chapter we present several scenarios over the security company’s case (Chap. 4) to demonstrate the general boundaries of the method.
    Original languageEnglish
    Title of host publicationPROACTIVE DATA MINING WITH DECISION TREES
    Pages63-85
    ISBN (Electronic)978-1-4939-0539-3
    DOIs
    StatePublished - 15 Feb 2014

    Publication series

    NameSpringerBriefs in Electrical and Computer Engineering
    ISSN (Print)2191-8112
    ISSN (Electronic)2191-8120

    Keywords

    • Proactive data mining
    • Sensitivity analysis

    Fingerprint

    Dive into the research topics of 'Sensitivity Analysis of Proactive Data Mining'. Together they form a unique fingerprint.

    Cite this