![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010. The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior in computer systems.
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that potential malicious incidents can be further investigated. Beyond computer - curity, data mining technology supports intelligence gathering and summari- tion for homeland security. For years, and most recently fueled by events such as September 11, 2001, government agencies have focused on developing and applying data mining technologies to monitor terrorist behaviors in public and private data collections. Theapplicationof data mining to person-speci?cdata raisesseriousconcerns regarding data con?dentiality and citizens' privacy rights. These concerns have led to the adoption of various legislation and policy controls. In 2005, the - ropean Union passed a data-retention directive that requires all telephone and Internetservice providersto store data ontheir consumers for up to two yearsto assist in the prevention of terrorismand organized crime. Similar data-retention regulationproposalsareunderheateddebateintheUnitedStatesCongress. Yet, the debate often focuses on ethical or policy aspects of the problem, such that resolutions have polarized consequences; e. g. , an organization can either share data for data mining purposes or it can not. Fortunately, computer scientists, and data mining researchers in particular, have recognized that technology can beconstructedtosupportlesspolarizedsolutions. Computerscientistsaredev- oping technologies that enable data mining goals without sacri?cing the privacy and security of the individuals to whom the data correspond.
|
![]() ![]() You may like...
Digital Enterprise Challenges…
George L. Kovacs, Peter Bertok, …
Hardcover
R5,911
Discovery Miles 59 110
Supervisory Control of Discrete Event…
John O. Moody, Panos J. Antsaklis
Hardcover
R4,463
Discovery Miles 44 630
Applications of Computational Mechanics…
Matos. M. Fernandes
Hardcover
R5,835
Discovery Miles 58 350
Computer Applications in Production…
Qiangnan Sun, Zesheng Tang, …
Hardcover
R8,494
Discovery Miles 84 940
Direct Engineering: Toward Intelligent…
Ali K. Kamrani, Peter R. Sferro
Hardcover
R5,805
Discovery Miles 58 050
|