An anomaly-based approach to the analysis of the social behavior of VoIP users

S Chiappetta, C Mazzariello, R Presta, SP Romano - Computer Networks, 2013 - Elsevier
In this paper we present the results of a study we recently conducted by analyzing a large
data set of VoIP Call Detail Records (CDRs), provided by an Italian telecom operator. The …

Improved multilevel security with latent semantic indexing

D Thorleuchter, D Van den Poel - Expert Systems with Applications, 2012 - Elsevier
Multilevel security (MLS) is specifically created to protect information from unauthorized
access. In MLS, documents are assigned to a security label by a trusted subject eg an …

Artificial immunity-based anomaly detection of network user behavior

Y Zhang, C Liu, H Qin - 2013 Ninth International Conference on …, 2013 - ieeexplore.ieee.org
Along with the rapid improvement of Internet, the malicious behavior of network users affects
computer networks negatively. An anomaly detection method of network user behaviors …

[PDF][PDF] Real-time and content-aware applications and infrastructure: a holistic approach dealing with architectural, performance and security issues.

R Presta, G Ventre, F Garofalo - 2013 - core.ac.uk
This thesis has been carried out in the field of Computer Networks. We have looked after two
challenging and popular multimedia applications over the Internet, namely Real-time …

An enhanced information security framework for effective management of enterprise information assets

MSKDM Marathamuthu - 2015 - search.proquest.com
This thesis proposes a new method of assessment within the integrated framework of risk
analysis and information security domain. The field of information security is vast and …

[PDF][PDF] IS Risk Practices From A CST Perspective: A Literature Review

M Lundgren - 2014 - diva-portal.org
Aim; This review analyzes how information security risk practice literature differ in light of
ideology and consequences on emancipation. Background; It is argued that information …

[CITATION][C] Towards a public-organization conversational framework of reputational influence: A grounded theory study

WN Wan Noordin - 2013 - Auckland University of Technology

[CITATION][C] Trust-based behaviors detection model for open enterprise computing environment

LM Shen, F Li, PF Sun, JC Niu - Computer …, 2013 - … Bamtnet. com. cn cims. diamt. net …