Sciweavers

956 search results - page 11 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
IRI
2005
IEEE
14 years 2 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ADMA
2006
Springer
150views Data Mining» more  ADMA 2006»
14 years 2 months ago
Web Scale Competitor Discovery Using Mutual Information
Abstract. The web with its rapid expansion has become an excellent resource for gathering information and people’s opinion. A company owner wants to know who is the competitor, a...
Rui Li, Shenghua Bao, Jin Wang, Yuanjie Liu, Yong ...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 2 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
CORR
2011
Springer
173views Education» more  CORR 2011»
13 years 3 months ago
U-Sem: Semantic Enrichment, User Modeling and Mining of Usage Data on the Social Web
With the growing popularity of Social Web applications, more and more user data is published on the Web everyday. Our research focuses on investigating ways of mining data from su...
Fabian Abel, Ilknur Celik, Claudia Hauff, Laura Ho...