Sciweavers

956 search results - page 93 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
ICDM
2002
IEEE
162views Data Mining» more  ICDM 2002»
15 years 2 months ago
Phrase-based Document Similarity Based on an Index Graph Model
Document clustering techniques mostly rely on single term analysis of the document data set, such as the Vector Space Model. To better capture the structure of documents, the unde...
Khaled M. Hammouda, Mohamed S. Kamel
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
15 years 10 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
IJNSEC
2008
120views more  IJNSEC 2008»
14 years 10 months ago
Formal Specification and Verification of a Secure Micropayment Protocol
As online businesses keep growing and Web services become pervasive, there is an increasing demand for micropayment protocols that facilitate microcommerce, namely selling content...
Mohamed G. Gouda, Alex X. Liu
ARTCOM
2009
IEEE
15 years 3 months ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna