Sciweavers

1906 search results - page 207 / 382
» Data Privacy
Sort
View
123
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
170
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
130
Voted
HOST
2009
IEEE
15 years 10 months ago
Local Heating Attacks on Flash Memory Devices
This paper shows how lasers can be used to implement modification attacks on EEPROM and Flash memory devices. This was achieved with inexpensive laser-diode module mounted on a mic...
Sergei P. Skorobogatov
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
15 years 10 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...
133
Voted
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
15 years 5 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu