Detecting data misuse by applying context-based data linkage.
Ma'ayan GafnyAsaf ShabtaiLior RokachYuval EloviciPublished in: Insider Threats@CCS (2010)
Keyphrases
- data sets
- database
- synthetic data
- original data
- data structure
- data sources
- raw data
- training data
- small number
- input data
- application domains
- sensor data
- high dimensional data
- data processing
- image data
- knowledge discovery
- data analysis
- real world
- prior knowledge
- data collection
- computer systems
- intrusion detection
- xml documents
- missing data
- metadata
- data mining algorithms
- genetic algorithm
- information retrieval
- big data
- complex data