Sciweavers

3651 search results - page 527 / 731
» Data Mining for Security Applications
Sort
View
OOPSLA
2005
Springer
15 years 11 months ago
Generalized algebraic data types and object-oriented programming
Generalized algebraic data types (GADTs) have received much attention recently in the functional programming community. They generalize the (type) parameterized algebraic datatype...
Andrew Kennedy, Claudio V. Russo
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
14 years 1 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 5 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
140
Voted
RAID
2010
Springer
15 years 3 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
SADFE
2008
IEEE
15 years 12 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....