We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
— In this contribution, a novel soft-output Ant Colony Optimization (ACO) based Multi-User Detector (MUD) is proposed for the synchronous Direct-Sequence Code-DivisionMultiple-Ac...
Chong Xu, Lie-Liang Yang, Robert G. Maunder, Lajos...
The goal of a load test is to uncover functional and performance problems of a system under load. Performance problems refer to the situations where a system suffers from unexpect...
Zhen Ming Jiang, Ahmed E. Hassan, Gilbert Hamann, ...