Sciweavers

14824 search results - page 2476 / 2965
» Security - Introduction
Sort
View
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
16 years 5 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
140
Voted
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 5 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 5 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 5 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
222
Voted
CHI
2008
ACM
16 years 5 months ago
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Many popular web browsers now include active phishing warnings since research has shown that passive warnings are often ignored. In this laboratory study we examine the effectiven...
Serge Egelman, Lorrie Faith Cranor, Jason I. Hong
« Prev « First page 2476 / 2965 Last » Next »