Sciweavers

3651 search results - page 92 / 731
» Data Mining for Security Applications
Sort
View
107
Voted
ACSAC
2004
IEEE
15 years 4 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
120
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 4 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
124
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
98
Voted
PAKDD
2009
ACM
170views Data Mining» more  PAKDD 2009»
15 years 9 months ago
Discovering Periodic-Frequent Patterns in Transactional Databases.
Since mining frequent patterns from transactional databases involves an exponential mining space and generates a huge number of patterns, efficient discovery of user-interest-based...
Byeong-Soo Jeong, Chowdhury Farhan Ahmed, Syed Kha...
NLDB
2005
Springer
15 years 6 months ago
Combining Biological Databases and Text Mining to Support New Bioinformatics Applications
Abstract. A large amount of biological knowledge today is only available from full-text research papers. Since neither manual database curators nor users can keep up with the rapid...
René Witte, Christopher J. O. Baker