Sciweavers

956 search results - page 106 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
SICHERHEIT
2010
14 years 7 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
PET
2004
Springer
15 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
KDD
2004
ACM
145views Data Mining» more  KDD 2004»
15 years 3 months ago
A graph-theoretic approach to extract storylines from search results
We present a graph-theoretic approach to discover storylines from search results. Storylines are windows that offer glimpses into interesting themes latent among the top search re...
Ravi Kumar, Uma Mahadevan, D. Sivakumar
63
Voted
CCS
2003
ACM
15 years 3 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
CORR
2011
Springer
326views Education» more  CORR 2011»
14 years 4 months ago
Mining User Comment Activity for Detecting Forum Spammers in YouTube
Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common p...
Ashish Sureka