Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
We have used a design science approach to study the collaborative creation of conceptual models. We have designed a collaborative modeling architecture based on business needs and...
We designed and implemented an ontological solution which makes provisions for choosing adequate devices/sensors for remote monitoring of patients who are suffering from post-stro...
This paper describes the issues and challenges for real-time knowledge discovery and then discusses approaches and challenges for real-time data mining and stream mining. Our goal...
Bhavani M. Thuraisingham, Latifur Khan, Murat Kant...
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
Aligning IT to business needs is still one of the most important concerns for senior management. The message of Business and IT Alignment (BIA) is logical and undisputed, but impl...
A. J. Gilbert Silvius, Steven De Haes, Wim Van Gre...
Despite optimistic expectations fast diffusion of mobile payments has not taken place after a decade of trials. Several explanations to this situation have been put forward using ...
This paper examines the non-linear nature of progress on software projects. It asserts that this uneven accomplishment stems from the continuous need to drive value quickly in res...