Sciweavers

956 search results - page 33 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
EUROSYS
2009
ACM
14 years 5 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
SIGMOD
2005
ACM
161views Database» more  SIGMOD 2005»
14 years 8 months ago
Building data mining solutions with OLE DB for DM and XML for analysis
A data mining component is included in Microsoft SQL Server 2000 and SQL Server 2005, one of the most popular DBMSs. This gives a push for data mining technologies to move from a ...
ZhaoHui Tang, Jamie Maclennan, Pyungchul (Peter) K...
CIMCA
2005
IEEE
14 years 2 months ago
Fibered Guard - A Hybrid Intelligent Approach to Denial of Service Prevention
This paper describes the system “Fibered Guard”, which is a hybrid intelligent web access management approach for the prevention of Denial of Service (DoS) and Distributed Deni...
Marvin Oliver Schneider, Jacques Calmet
ATAL
2008
Springer
13 years 10 months ago
Agent-community-network-based business matching and collaboration support system
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ke...
DASFAA
2006
IEEE
168views Database» more  DASFAA 2006»
14 years 5 days ago
COWES: Clustering Web Users Based on Historical Web Sessions
Clustering web users is one of the most important research topics in web usage mining. Existing approaches cluster web users based on the snapshots of web user sessions. They do no...
Ling Chen 0002, Sourav S. Bhowmick, Jinyan Li