-
1
-
-
0242674432
-
Hippocratic databases
-
Morgan-Kaufmann, New York
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), pp.143-154. Morgan-Kaufmann, New York (2002)
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases (VLDB)
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
33846284740
-
A roadmap for comprehensive online privacy policies
-
Anton, A., Bertino, E., Li, N., Yu, T.: A roadmap for comprehensive online privacy policies. In: CERIAS Technical Report (2004)
-
(2004)
CERIAS Technical Report
-
-
Anton, A.1
Bertino, E.2
Li, N.3
Yu, T.4
-
7
-
-
0025401005
-
The computational complexity of probabilistic inference using bayesian belief networks
-
2-3
-
Cooper G.F. (1990). The computational complexity of probabilistic inference using bayesian belief networks. Artif. Intell. 42(2-3): 393-405
-
(1990)
Artif. Intell.
, vol.42
, pp. 393-405
-
-
Cooper, G.F.1
-
8
-
-
0031269184
-
On the optimality of the simple bayesian classifier under zero-one loss
-
2-3
-
Domingos P. and Pazzani M.J. (1997). On the optimality of the simple bayesian classifier under zero-one loss. Mach. Learn. 29(2-3): 103-130
-
(1997)
Mach. Learn.
, vol.29
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.J.2
-
10
-
-
0021635541
-
Statistical diagnosis based on conditional independence does not require it
-
4
-
Hilden J. (1984). Statistical diagnosis based on conditional independence does not require it. Comput. Biol. Med. 14(4): 429-435
-
(1984)
Comput. Biol. Med.
, vol.14
, pp. 429-435
-
-
Hilden, J.1
-
11
-
-
0022064511
-
A best possible approximation algorithm for the k-center problem
-
Hochbaum D.S. and Shmoys DB. (1985). A best possible approximation algorithm for the k-center problem. Math. Oper. Res. 10: 180-184
-
(1985)
Math. Oper. Res.
, vol.10
, pp. 180-184
-
-
Hochbaum, D.S.1
Shmoys, D.B.2
-
16
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
3
-
Lane T. and Brodley CE. (1999). Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(3): 295-331
-
(1999)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.2
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
18
-
-
84956982801
-
Learning fingerprints for a database intrusion detection system
-
Springer-Heidelburg
-
Lee, S.Y., Low, W.L., Wong, P.Y. Learning fingerprints for a database intrusion detection system. In: ESORICS '02: Proceedings of the 7th European Symposium on Research in Computer Security London. pp. 264-280, Springer-Heidelburg (2002)
-
(2002)
ESORICS '02: Proceedings of the 7th European Symposium on Research in Computer Security London
, pp. 264-280
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
21
-
-
0003451777
-
-
Technical Report, Computer Science Laboratory, SRI International
-
Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P., Javitz, H., Valdes, A., Garvey, T.: A real-time intrusion detection expert system (ides)-final technical report. Technical Report, Computer Science Laboratory, SRI International (1992)
-
(1992)
A Real-time Intrusion Detection Expert System (Ides)-final Technical Report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
24
-
-
26444449929
-
A comprehensive approach to anomaly detection in relational databases
-
Spalka, A., Lehnhardt, J.: A comprehensive approach to anomaly detection in relational databases. In: DBSec, pp. 207-221 (2005)
-
(2005)
DBSec
, pp. 207-221
-
-
Spalka, A.1
Lehnhardt, J.2
-
26
-
-
34247134594
-
A learning-based approach to the detection of sql attacks
-
Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of sql attacks. In: Proceedings of the International Conference on detection of intrusions and malware, and vulnerability assessment (DIMVA) (2003)
-
(2003)
Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
|