Sciweavers

6318 search results - page 139 / 1264
» Data Leakage Detection
Sort
View
RAID
2007
Springer
15 years 10 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 10 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
15 years 11 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 11 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
16 years 5 months ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth