


default search action
Information Sciences, Volume 231
Volume 231, May 2013
- Yuval Elovici, Lior Rokach, Sahin Albayrak

:
Guest editorial: Special issue on data mining for information security. 1-3
- Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao:

Toward a more practical unsupervised anomaly detection system. 4-14 - Cristian Pinzón

, Juan Francisco de Paz
, Álvaro Herrero
, Emilio Corchado, Javier Bajo
, Juan M. Corchado
:
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining. 15-31 - Jen-Yan Huang, I-En Liao, Yu-Fang Chung

, Kuen-Tzung Chen:
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. 32-44
- Farrukh Shahzad

, Muhammad Shahzad, Muddassar Farooq:
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS. 45-63 - Igor Santos

, Felix Brezo, Xabier Ugarte-Pedrero, Pablo García Bringas
:
Opcode sequences as representation of executables for data-mining-based unknown malware detection. 64-82
- Rui Chen, Benjamin C. M. Fung

, Noman Mohammed, Bipin C. Desai
, Ke Wang:
Privacy-preserving trajectory data publishing by local suppression. 83-97 - Farkhund Iqbal

, Hamad Binsalleeh
, Benjamin C. M. Fung
, Mourad Debbabi
:
A unified data mining solution for authorship analysis in anonymous textual communications. 98-112 - Ji Young Chun, Dowon Hong

, Ik Rae Jeong, Dong Hoon Lee:
Privacy-preserving disjunctive normal form operations on distributed sets. 113-122
- Mengyu Qiao, Andrew H. Sung, Qingzhong Liu

:
MP3 audio steganalysis. 123-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














