Sciweavers

110 search results - page 18 / 22
» Modeling User Behaviors from FTP Server Logs
Sort
View
ACSAC
2005
IEEE
14 years 19 days ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
DKE
2007
130views more  DKE 2007»
13 years 7 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
WWW
2009
ACM
14 years 7 months ago
Smart Miner: a new framework for mining large scale web usage data
In this paper, we propose a novel framework called SmartMiner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar...
KDD
2009
ACM
143views Data Mining» more  KDD 2009»
14 years 7 months ago
Optimizing web traffic via the media scheduling problem
Website traffic varies through time in consistent and predictable ways, with highest traffic in the middle of the day. When providing media content to visitors, it is important to...
Lars Backstrom, Jon M. Kleinberg, Ravi Kumar
CMS
2006
158views Communications» more  CMS 2006»
13 years 8 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...