Sciweavers

3651 search results - page 28 / 731
» Data Mining for Security Applications
Sort
View
ECAI
2004
Springer
15 years 3 months ago
Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exace...
Josenildo Costa da Silva, Matthias Klusch, Stefano...
95
Voted
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 4 months ago
A Probability Distribution Of Functional Random Variable With A Functional Data Analysis Application
Probability distributions are central tools for probabilistic modeling in data mining, and they lack in functional data analysis (FDA). In this paper we propose a probability dist...
Etienne Cuvelier, Monique Noirhomme-Fraiture
78
Voted
SIGKDD
2002
90views more  SIGKDD 2002»
14 years 9 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
SIGMOD
2003
ACM
121views Database» more  SIGMOD 2003»
15 years 10 months ago
An environmental sensor network to determine drinking water quality and security
Finding patterns in large, real, spatio/temporal data continues to attract high interest (e.g., sales of products over space and time, patterns in mobile phone users; sensor netwo...
Anastassia Ailamaki, Christos Faloutsos, Paul S. F...