MIR
发表于 2025-3-23 12:50:28
http://reply.papertrans.cn/83/8278/827750/827750_11.png
SNEER
发表于 2025-3-23 16:22:15
Deductive Database Securitye combines meta-programming and partial evaluation techniques, has a number of attractive technical results associated with it, and can be used as a basis for efficient implementations of protected forms of deductive database.
神圣将军
发表于 2025-3-23 20:10:16
http://reply.papertrans.cn/83/8278/827750/827750_13.png
水汽
发表于 2025-3-24 02:07:37
http://reply.papertrans.cn/83/8278/827750/827750_14.png
爱国者
发表于 2025-3-24 02:35:46
http://reply.papertrans.cn/83/8278/827750/827750_15.png
cornucopia
发表于 2025-3-24 07:41:59
On Security and Privacy Risks in Association Mining Algorithmsn this paper, we present a risk assessment procedure designed to control the security and privacy threats presented by association mining algorithms. The assessment procedure is based upon a new data analysis process that we introduce called Knowledge Hiding in Databases (KHD). The specific contribu
mercenary
发表于 2025-3-24 14:41:40
Mining Malicious Corruption of Data with Hidden Markov Modelsf profiling databases via time series analysis to detect anomalous changes to a database. We view the history of modifications in the database as a set of time series sequences. We then examine the application of Hidden Markov models (HMMs)as a mining tool to capture the normal trend of a database’s
ANIM
发表于 2025-3-24 15:24:04
1868-4238 ed on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: .-Role-Based Access Control; .-Database Security; .-XML Security; .-Data Mining and Inference; .-Multimedia System Security; .-Network Security; .-Public Key Infrastruc
opprobrious
发表于 2025-3-24 19:53:02
http://reply.papertrans.cn/83/8278/827750/827750_19.png
Peculate
发表于 2025-3-25 02:46:53
http://reply.papertrans.cn/83/8278/827750/827750_20.png