Sciweavers

5 search results - page 1 / 1
» Detecting privacy leaks using corpus-based association rules
Sort
View
KDD
2008
ACM
143views Data Mining» more  KDD 2008»
14 years 4 months ago
Detecting privacy leaks using corpus-based association rules
Richard Chow, Philippe Golle, Jessica Staddon
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 6 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
13 years 11 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
OOPSLA
2005
Springer
13 years 10 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 8 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok