Sciweavers

6318 search results - page 124 / 1264
» Data Leakage Detection
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
14 years 8 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
CSFW
2004
IEEE
15 years 5 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
CIKM
2009
Springer
15 years 8 months ago
LoOP: local outlier probabilities
Many outlier detection methods do not merely provide the decision for a single data object being or not being an outlier but give also an outlier score or “outlier factor” sig...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
EDBT
2006
ACM
142views Database» more  EDBT 2006»
15 years 5 months ago
Conflicting XML Updates
There has been growing interest in the addition of update operations to languages that operate on XML data, for example, XQuery and XJ. These update operations support efficient an...
Mukund Raghavachari, Oded Shmueli
ICIAP
2005
ACM
16 years 2 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero