Sciweavers

61 search results - page 8 / 13
» Detecting Privacy and Ethical Sensitivity in Data Mining Res...
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch
ACSAC
2003
IEEE
15 years 3 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
CIKM
2009
Springer
15 years 4 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
15 years 11 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 4 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...