Sciweavers

137 search results - page 20 / 28
» Preserving Privacy through Data Generation
Sort
View
SIGKDD
2000
150views more  SIGKDD 2000»
14 years 11 months ago
KDD-Cup 2000 Organizers' Report: Peeling the Onion
We describe KDD-Cup 2000, the yearly competition in data mining. For the first time the Cup included insight problems in addition to prediction problems, thus posing new challenge...
Ron Kohavi, Carla E. Brodley, Brian Frasca, Llew M...
CCS
2009
ACM
15 years 6 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
IFIP
2010
Springer
14 years 9 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
CSFW
2004
IEEE
15 years 3 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
VIS
2009
IEEE
205views Visualization» more  VIS 2009»
16 years 25 days ago
Time and Streak Surfaces for Flow Visualization in Large Time-Varying Data Sets
Time and streak surfaces are ideal tools to illustrate time-varying vector fields since they directly appeal to the intuition about coherently moving particles. However, efficient ...
Hari Krishnan, Christoph Garth, Kenneth I. Joy