Sciweavers

194 search results - page 4 / 39
» Misuse Detection for Information Retrieval Systems: A Prelim...
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 7 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
ESWS
2007
Springer
13 years 12 months ago
A Unified Approach to Retrieving Web Documents and Semantic Web Data
The Semantic Web seems to be evolving into a property-linked web of RDF data, conceptually divorced from (but physically housed in) the hyperlinked web of HTML documents. We discus...
Trivikram Immaneni, Krishnaprasad Thirunarayan
CLEF
2011
Springer
12 years 5 months ago
External Plagiarism Detection using Information Retrieval and Sequence Alignment - Notebook for PAN at CLEF 2011
Abstract This paper describes the University of Sheffield entry for the 3rd International Competition on Plagiarism Detection which attempted the monolingual external plagiarism d...
Rao Muhammad Adeel Nawab, Mark Stevenson, Paul D. ...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
13 years 11 months ago
Detecting Document Genre for Personalization of Information Retrieval
We report on the effectiveness of language models for personalization of retrieval results based on a searcher’s preference for document genre. In principle, such preferences ca...
Gheorghe Muresan, Catherine L. Smith, Michael Cole...
DIM
2009
ACM
13 years 10 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad