Preventing malicious data harvesting from deallocated memory areas.
Maxim AnikeevFelix C. FreilingPublished in: SIN (2013)
Keyphrases
- data sets
- synthetic data
- data collection
- original data
- computing power
- complex data
- neural network
- data processing
- raw data
- computer systems
- statistical analysis
- high quality
- training data
- insider threat
- incoming data
- sensor data
- high dimensional data
- database
- data mining techniques
- data points
- data sources
- xml documents
- data analysis