Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
The Bayesian Aerosol Release Detector (BARD) is a biosurveillance system for detecting and characterizing disease outbreaks caused by aerosol releases of anthrax. A major challenge...
Aurel Cami, Garrick L. Wallstrom, William R. Hogan
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...