Sciweavers

7 search results - page 2 / 2
» Modeling Ad-hoc rushing attack in a negligibility-based secu...
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
13 years 11 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
KBSE
2005
IEEE
13 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer