Sciweavers

425 search results - page 4 / 85
» Audit
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 1 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
87
Voted
ECIS
2003
14 years 10 months ago
Real-time workflow audit data integration into data warehouse systems
Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems incl...
Josef Schiefer, Jun-Jang Jeng, Robert M. Bruckner
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
15 years 3 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...