Sciweavers

6318 search results - page 113 / 1264
» Data Leakage Detection
Sort
View
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
16 years 2 months ago
Online novelty detection on temporal sequences
: Novelty detection, or anomaly detection, on temporal sequences has increasingly attracted attention from researchers in different areas. In this paper, we present a new framework...
Junshui Ma, Simon Perkins
AIR
2004
131views more  AIR 2004»
15 years 1 months ago
A Survey of Outlier Detection Methodologies
Abstract. Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes ...
Victoria J. Hodge, Jim Austin
PVLDB
2010
117views more  PVLDB 2010»
15 years 10 days ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
SAMT
2007
Springer
251views Multimedia» more  SAMT 2007»
15 years 8 months ago
Event Detection in Pedestrian Detection and Tracking Applications
Abstract. In this paper, we present a system framework for event detection in pedestrian and tracking applications. The system is built upon a robust computer vision approach to de...
Philip Kelly, Noel E. O'Connor, Alan F. Smeaton
INDOCRYPT
2010
Springer
14 years 12 months ago
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
Abstract. This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Ou...
Gregory V. Bard, Nicolas Courtois, Jorge Nakahara,...