메뉴 건너뛰기




Volumn , Issue , 2006, Pages 208-215

Privacy intrusion detection using dynamic Bayesian networks

Author keywords

Dynamic Bayesian networks; Intrusion detection; Privacy intrusion; Probabilistic reasoning

Indexed keywords

CURRENT PRACTICES; DATABASE OPERATORS; DYNAMIC BAYESIAN NETWORK; DYNAMIC BAYESIAN NETWORKS; INFORMATION COLLECTIONS; INFORMATION HANDLING; PERSONAL INFORMATION; PRIVACY INTRUSION; PRIVACY POLICIES; PRIVACY PRACTICES; PRIVATE DATA; PROBABILISTIC REASONING; STOCHASTIC PROCESS;

EID: 70450214980     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1151454.1151493     Document Type: Conference Paper
Times cited : (18)

References (51)
  • 2
    • 34547321497 scopus 로고    scopus 로고
    • Bayesian network privacy intrusion detection
    • Technical report, Faculty of Computer Science, Dalhousie University, NS, Canada
    • X. An, D. Jutla, and N. Gereone. Bayesian network privacy intrusion detection. Technical report, Faculty of Computer Science, Dalhousie University, NS, Canada, 2006.
    • (2006)
    • An, X.1    Jutla, D.2    Gereone, N.3
  • 3
    • 34250757477 scopus 로고    scopus 로고
    • A roadmap for comprehensive online privacy policy
    • Technical report, CERIAS, Purdue University, West Lafayette, CERIAS-2004-47
    • A. I. Antón, E. Bertino, N. Li, and T. Yu. A roadmap for comprehensive online privacy policy. Technical report, CERIAS, Purdue University, West Lafayette, CERIAS-2004-47, 2004.
    • (2004)
    • Antón, A.I.1    Bertino, E.2    Li, N.3    Yu, T.4
  • 4
    • 26944464568 scopus 로고    scopus 로고
    • A comparison of HMMs and dynamic Bayesian networks for recognizing office activities
    • L. Ardissono, P. Brna, and A. Mitrovic, editors, of, Edinburgh, Scotland, UK, July 24-29, Springer
    • L. Ardissono, P. Brna, and A. Mitrovic, editors. A comparison of HMMs and dynamic Bayesian networks for recognizing office activities, volume 3538 of Lecture Notes in Computer Science (LNCS), Edinburgh, Scotland, UK, July 24-29 2005. Springer.
    • (2005) Lecture Notes in Computer Science , vol.3538
  • 5
    • 24944578141 scopus 로고    scopus 로고
    • Enterprise privacy authorization language (EPAL 1.2)
    • Technical report, W3C Member Submission, November
    • P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise privacy authorization language (EPAL 1.2). Technical report, W3C Member Submission, http://www.w3.org/Submission/2003/SUBM-EPAL-20031110, November 2003.
    • (2003)
    • Ashley, P.1    Hada, S.2    Karjoth, G.3    Powers, C.4    Schunter, M.5
  • 9
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • S. Chebrolu, A. Abraham, and J. P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4):295-307, 2005.
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 10
    • 70450137679 scopus 로고    scopus 로고
    • P. R. ClearingHouse. Privacy today: A review of current issues. Technical report, Privacy Rights Clearinghouse, San Diego, CA, USA. http://www. privacyrights.org, 2002.
    • P. R. ClearingHouse. Privacy today: A review of current issues. Technical report, Privacy Rights Clearinghouse, San Diego, CA, USA. http://www. privacyrights.org, 2002.
  • 11
    • 0013243382 scopus 로고    scopus 로고
    • The platform for privacy preferences 1.0 (P3P 1.0) specification
    • Technical report, W3C Recommendation, April
    • L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. The platform for privacy preferences 1.0 (P3P 1.0) specification. Technical report, W3C Recommendation, http://www.w3.org/TR/P3P, April 2002.
    • (2002)
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3    Presler-Marshall, M.4    Reagle, J.5
  • 12
    • 0001781779 scopus 로고
    • Dynamic network models for forecasting
    • D. Dubois, M. P. Wellman, B. D'Ambrosio, and P. Smets, editors, Stanford, CA, USA, Morgan Kaufmann Publishers
    • P. Dagum, A. Galper, and E. Horvitz. Dynamic network models for forecasting. In D. Dubois, M. P. Wellman, B. D'Ambrosio, and P. Smets, editors, Proceedings of the 8th Conference on Uncertainty in Artificial Intelligence (UAI-1992), pages 41-48, Stanford, CA, USA, 1992. Morgan Kaufmann Publishers.
    • (1992) Proceedings of the 8th Conference on Uncertainty in Artificial Intelligence (UAI-1992) , pp. 41-48
    • Dagum, P.1    Galper, A.2    Horvitz, E.3
  • 15
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • D. E. Denning and J. Schlörer. Inference control for statistical databases. IEEE Computer, 16(7):69-82, 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 16
    • 70450120509 scopus 로고    scopus 로고
    • EPIC and PI. Privacy & human rights: An international survey of privacy laws and developments. Technical report, Electronic Privacy Information Center (EPIC), Washington, DC, USA, http://www.epic.org, and Privacy International (PI), London, UK, http://www.privacyinternational.org, 2004.
    • EPIC and PI. Privacy & human rights: An international survey of privacy laws and developments. Technical report, Electronic Privacy Information Center (EPIC), Washington, DC, USA, http://www.epic.org, and Privacy International (PI), London, UK, http://www.privacyinternational.org, 2004.
  • 17
    • 70450158038 scopus 로고    scopus 로고
    • EXOCOM. Privacy technology review. Technical report, Business Strategy and IT Consulting Division, The EXOCOM Group Inc. (for the Office of Health and the Information Highway, Health Canada), 2001.
    • EXOCOM. Privacy technology review. Technical report, Business Strategy and IT Consulting Division, The EXOCOM Group Inc. (for the Office of Health and the Information Highway, Health Canada), 2001.
  • 19
    • 0031268341 scopus 로고    scopus 로고
    • Factorial hidden Markov models
    • Z. Ghahramani and M. I. Jordan. Factorial hidden Markov models. Machine Learning, 29:245-273, 1997.
    • (1997) Machine Learning , vol.29 , pp. 245-273
    • Ghahramani, Z.1    Jordan, M.I.2
  • 20
    • 26844488270 scopus 로고    scopus 로고
    • Paid: A probabilistic agent-based intrusion detection system
    • October
    • V. Gowadia, C. Farkas, and M. Valtorta. Paid: A probabilistic agent-based intrusion detection system. Computers & Security, 24(7):529-545, October 2005.
    • (2005) Computers & Security , vol.24 , Issue.7 , pp. 529-545
    • Gowadia, V.1    Farkas, C.2    Valtorta, M.3
  • 22
    • 0041467002 scopus 로고
    • Probabilistic temporal reasoning with endogenous change
    • P. Besnard and S. Hanks, editors, Montréal, Québec, Canada, August 18-20, Morgan Kaufmann Publishers
    • S. Hanks, D. Madigan, and J. Gavrin. Probabilistic temporal reasoning with endogenous change. In P. Besnard and S. Hanks, editors, Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI-1995), Montréal, Québec, Canada, August 18-20 1995. Morgan Kaufmann Publishers.
    • (1995) Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI-1995)
    • Hanks, S.1    Madigan, D.2    Gavrin, J.3
  • 23
    • 34547336952 scopus 로고
    • Computers and privacy: A survey
    • June
    • L. J. Huffman. Computers and privacy: A survey. Computing Surveys, 1(2):85-103, June 1969.
    • (1969) Computing Surveys , vol.1 , Issue.2 , pp. 85-103
    • Huffman, L.J.1
  • 24
    • 0013270513 scopus 로고    scopus 로고
    • Database security and privacy
    • March
    • S. Jajodia. Database security and privacy. ACM Computing Surveys, 28(1):129-131, March 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1 , pp. 129-131
    • Jajodia, S.1
  • 25
    • 33845255358 scopus 로고    scopus 로고
    • Network security: Bayesian network intrusion detection
    • Technical report, Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA
    • K. Johansen and S. Lee. Network security: Bayesian network intrusion detection. Technical report, Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA, 2003.
    • (2003)
    • Johansen, K.1    Lee, S.2
  • 35
    • 34547306128 scopus 로고    scopus 로고
    • Privacy issues: Business impacts and responsibilities
    • Technical report, CAAA/SAP AG Technology and Accounting Education Seminar Series, Canadian Academic Accounting Association CAAA
    • R. G. Parker. Privacy issues: Business impacts and responsibilities. Technical report, CAAA/SAP AG Technology and Accounting Education Seminar Series, Canadian Academic Accounting Association (CAAA), 2005.
    • (2005)
    • Parker, R.G.1
  • 38
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • February
    • L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of IEEE, 77(2):257-286, February 1989.
    • (1989) Proceedings of IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 41
    • 70450137677 scopus 로고    scopus 로고
    • Annual report of privacy commissioner 2003-2004
    • Technical report, Office of the Privacy Commissioner, New Zealand
    • M. Shroff. Annual report of privacy commissioner 2003-2004. Technical report, Office of the Privacy Commissioner, New Zealand, 2004.
    • (2004)
    • Shroff, M.1
  • 42
    • 0031568356 scopus 로고    scopus 로고
    • Probabilistic independence networks for hidden Markov probability models
    • P. Smyth, D. Heckerman, and M. Jordan. Probabilistic independence networks for hidden Markov probability models. Neural Computation, 9(2):227-269, 1997.
    • (1997) Neural Computation , vol.9 , Issue.2 , pp. 227-269
    • Smyth, P.1    Heckerman, D.2    Jordan, M.3
  • 45


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.