Mining Anomalous Usage of Sensitive Data through Anomaly Detection.
Xin JinYan XiongWenchao HuangZhaoyi MengPublished in: BigCom (2017)
Keyphrases
- anomaly detection
- sensitive data
- detect anomalies
- privacy preserving
- intrusion detection
- smart card
- anomalous behavior
- sensitive information
- network intrusion detection
- information security
- detecting anomalies
- data storage
- data sharing
- detecting anomalous
- data privacy
- intrusion detection system
- network traffic
- network security
- data mining
- third party
- privacy protection
- network anomaly detection
- knowledge discovery
- database
- pattern mining
- one class support vector machines
- personal data
- decision trees
- machine learning
- data mining techniques
- unsupervised learning
- text mining
- private information
- normal behavior
- itemsets
- negative selection algorithm
- frequent patterns