Sciweavers

2355 search results - page 102 / 471
» Anonymizing Temporal Data
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
LREC
2008
133views Education» more  LREC 2008»
13 years 11 months ago
Automatic Identification of Temporal Information in Tourism Web Pages
This paper presents our work on the detection of temporal information in web pages. The pages examined within the scope of this study were taken from the tourism sector and the te...
Stéphanie Weiser, Philippe Laublet, Jean-Lu...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 10 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 4 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CIKM
2008
Springer
14 years 3 days ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong