Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2009
A study of online service and information exposure of public companies
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 85–90https://doi.org/10.1145/1599272.1599287It is believed that public companies should have put lots of efforts and resources in designing and implementing effective security policy in their daily information processing and management against potential cyber attacks. A company web server ...
- research-articleJune 2009
On the efficacy of data mining for security applications
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 75–83https://doi.org/10.1145/1599272.1599286Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several of the more common criticisms and analyzes some factors that bear on whether the criticisms are valid ...
- research-articleJune 2009
Towards trusted intelligence information sharing
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 45–52https://doi.org/10.1145/1599272.1599283While millions of dollars have been invested in information technologies to improve intelligence information sharing among law enforcement agencies at the Federal, Tribal, State and Local levels, there remains a hesitation to share information between ...
- research-articleJune 2009
Data security and integrity: developments and directions
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Page 43https://doi.org/10.1145/1599272.1599281Data is a critical resource in numerous organizations. One of the challenging problems facing these organizations today is to ensure that only authorized individuals have address to data. Data also has to be protected from malicious corruption.
Much of ...
- research-articleJune 2009
Online phishing classification using adversarial data mining and signaling games
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 33–42https://doi.org/10.1145/1599272.1599279In adversarial systems, the performance of a classifier decreases after it is deployed, as the adversary learns to defeat it. Recently, adversarial data mining was introduced as a solution to this, where the classification problem is viewed as a game ...
- research-articleJune 2009
Malware detection using statistical analysis of byte-level file content
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 23–31https://doi.org/10.1145/1599272.1599278Commercial anti-virus software are unable to provide protection against newly launched (a.k.a "zero-day") malware. In this paper, we propose a novel malware detection technique which is based on the analysis of byte-level file content. The novelty of ...
- research-articleJune 2009
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 11–21https://doi.org/10.1145/1599272.1599277In network traffic monitoring, and more particularly in the realm of threat intelligence, the problem of "attack attribution" refers to the process of effectively attributing new attack events to (un)-known phenomena, based on some evidence or traces ...
- research-articleJune 2009
Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 3–9https://doi.org/10.1145/1599272.1599276Traditional Hidden Markov Model (HMM) has been successfully applied to anomaly intrusion detection. Incremental HMM (IHMM) further improves the training time of HMM. However, both HMM and IHMM still have the problem of high false positive rate. In this ...
- research-articleJune 2009
AntiPhish: lessons learnt
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence InformaticsJune 2009, Pages 1–2https://doi.org/10.1145/1599272.1599274Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from ...
- proceedingJune 2009
CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Computer supported communication and infrastructure are integral parts of modern economy. Their security is of incredible importance to a wide variety of practical domains ranging from Internet service providers to the banking industry and e-commerce, ...