Sciweavers

651 search results - page 123 / 131
» Negative Database for Data Security
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
14 years 8 months ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...
CIKM
2009
Springer
14 years 2 months ago
Generating comparative summaries of contradictory opinions in text
This paper presents a study of a novel summarization problem called contrastive opinion summarization (COS). Given two sets of positively and negatively opinionated sentences whic...
Hyun Duk Kim, ChengXiang Zhai
BMCBI
2007
109views more  BMCBI 2007»
13 years 7 months ago
A domain-based approach to predict protein-protein interactions
Background: Knowing which proteins exist in a certain organism or cell type and how these proteins interact with each other are necessary for the understanding of biological proce...
Mudita Singhal, Haluk Resat
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...