Sciweavers

6318 search results - page 40 / 1264
» Data Leakage Detection
Sort
View
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 6 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
VLDB
2004
ACM
134views Database» more  VLDB 2004»
15 years 5 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
ACSAC
2000
IEEE
15 years 4 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
CVPR
2012
IEEE
13 years 1 months ago
A Unified Framework for Event Summarization and Rare Event Detection
A novel approach for event summarization and rare event detection is proposed. Unlike conventional methods that deal with event summarization and rare event detection independently...
Junseok Kwon and Kyoung Mu Lee
SIGMOD
2010
ACM
184views Database» more  SIGMOD 2010»
15 years 4 months ago
Load-balanced query dissemination in privacy-aware online communities
We propose a novel privacy-preserving distributed infrastructure in which data resides only with the publishers owning it. The infrastructure disseminates user queries to publishe...
Emiran Curtmola, Alin Deutsch, K. K. Ramakrishnan,...