Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
The paper addresses the purposes and design decisions produced while developing a peer-to-peer virtual world platform. The work is being done within the FP7 VirtualLife project. Th...
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...