Sciweavers

55 search results - page 1 / 11
» Misuse Detection in Database Systems Through User Profiling
Sort
View
RAID
1999
Springer
13 years 9 months ago
Misuse Detection in Database Systems Through User Profiling
Christina Yip Chung, Michael Gertz, Karl N. Levitt
ISSA
2004
13 years 6 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
PDPTA
2003
13 years 6 months ago
Misuse Detection for Information Retrieval Systems: A Preliminary Approach
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
CIKM
2003
Springer
13 years 10 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
ACSAC
1998
IEEE
13 years 9 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron