Sciweavers

6318 search results - page 125 / 1264
» Data Leakage Detection
Sort
View
AUSFORENSICS
2004
15 years 3 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 7 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
ICDM
2007
IEEE
199views Data Mining» more  ICDM 2007»
15 years 8 months ago
Discovering Structural Anomalies in Graph-Based Data
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder
GVD
2009
108views Database» more  GVD 2009»
14 years 11 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
NAACL
2010
14 years 12 months ago
Using Mostly Native Data to Correct Errors in Learners' Writing
We present results from a range of experiments on article and preposition error correction for non-native speakers of English. We first compare a language model and errorspecific ...
Michael Gamon