An anomaly-based approach to the analysis of the social behavior of VoIP users
In this paper we present the results of a study we recently conducted by analyzing a large
data set of VoIP Call Detail Records (CDRs), provided by an Italian telecom operator. The …
data set of VoIP Call Detail Records (CDRs), provided by an Italian telecom operator. The …
Improved multilevel security with latent semantic indexing
D Thorleuchter, D Van den Poel - Expert Systems with Applications, 2012 - Elsevier
Multilevel security (MLS) is specifically created to protect information from unauthorized
access. In MLS, documents are assigned to a security label by a trusted subject eg an …
access. In MLS, documents are assigned to a security label by a trusted subject eg an …
Artificial immunity-based anomaly detection of network user behavior
Y Zhang, C Liu, H Qin - 2013 Ninth International Conference on …, 2013 - ieeexplore.ieee.org
Along with the rapid improvement of Internet, the malicious behavior of network users affects
computer networks negatively. An anomaly detection method of network user behaviors …
computer networks negatively. An anomaly detection method of network user behaviors …
[PDF][PDF] Real-time and content-aware applications and infrastructure: a holistic approach dealing with architectural, performance and security issues.
This thesis has been carried out in the field of Computer Networks. We have looked after two
challenging and popular multimedia applications over the Internet, namely Real-time …
challenging and popular multimedia applications over the Internet, namely Real-time …
An enhanced information security framework for effective management of enterprise information assets
MSKDM Marathamuthu - 2015 - search.proquest.com
This thesis proposes a new method of assessment within the integrated framework of risk
analysis and information security domain. The field of information security is vast and …
analysis and information security domain. The field of information security is vast and …
[PDF][PDF] IS Risk Practices From A CST Perspective: A Literature Review
M Lundgren - 2014 - diva-portal.org
Aim; This review analyzes how information security risk practice literature differ in light of
ideology and consequences on emancipation. Background; It is argued that information …
ideology and consequences on emancipation. Background; It is argued that information …
[CITATION][C] Towards a public-organization conversational framework of reputational influence: A grounded theory study
WN Wan Noordin - 2013 - Auckland University of Technology
[CITATION][C] Trust-based behaviors detection model for open enterprise computing environment
LM Shen, F Li, PF Sun, JC Niu - Computer …, 2013 - … Bamtnet. com. cn cims. diamt. net …