Sciweavers

3651 search results - page 13 / 731
» Data Mining for Security Applications
Sort
View
ISI
2007
Springer
15 years 4 months ago
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping
Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingha...
SACMAT
2010
ACM
14 years 8 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
88
Voted
JCP
2006
173views more  JCP 2006»
14 years 10 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 4 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
ACSAC
2006
IEEE
15 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu