Sciweavers

3 search results - page 1 / 1
» Publishing Search Logs - A Comparative Study of Privacy Guar...
Sort
View
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 6 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...
PET
2010
Springer
13 years 8 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing users...
Sai Teja Peddinti, Nitesh Saxena
ACSAC
2004
IEEE
13 years 8 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson