Sciweavers

398 search results - page 6 / 80
» Mining System Audit Data: Opportunities and Challenges
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ECIS
2000
14 years 11 months ago
Enhancing Government Decision Making Through Knowledge Discovery from Data
- A major challenge facing management in developed countries is improving the performance of knowledge and service workers, i.e. the decision makers. In a developing country such a...
Herna L. Viktor, Heidi Arndt, Mauritz Oberholzer
HOTOS
2007
IEEE
15 years 1 months ago
Auditing to Keep Online Storage Services Honest
A growing number of online service providers offer to store customers' photos, email, file system backups, and other digital assets. Currently, customers cannot make informed...
Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram S...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 3 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
APVIS
2008
14 years 11 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma