نتایج جستجو برای: data sanitization

تعداد نتایج: 2410486  

Journal: :Expert Syst. Appl. 2009
Shyue-Liang Wang

We propose here an efficient data mining algorithm to sanitize informative association rules when the database is updated, i.e., when a new data set is added to the original database. For a given predicting item, an informative association rule set [16] is the smallest association rule set that makes the same prediction as the entire association rule set by confidence priority. Several approach...

Journal: :American Journal of Public Health and the Nations Health 1948

Journal: :International Journal for Research in Applied Science and Engineering Technology 2021

Journal: :JASIST 2016
David Sánchez Montserrat Batet

Within the current context of Information Societies, large amounts of information are daily exchanged and/or released. The sensitive nature of much of this information causes a serious privacy threat when documents are uncontrollably made available to untrusted third parties. In such cases, appropriate data protection measures should be undertaken by the responsible organization, especially und...

Journal: :Decision Support Systems 2015
Hsin-Jung Cheng Akhil Kumar

Process mining techniques are designed to read process logs and extract process models from them. However, real world logs are often noisy and such logs produce bad, spaghetti-like process models. We propose a technique to sanitize noisy logs by first building a classifier on a subset of the log, and applying the classifier rules to remove noisy traces from the log. The improvement in the quali...

2012
Kuniyasu Suzaki Kengo Iijima Toshiki Yagi Cyrille Artho

Memory deduplication merges same-content memory pages and reduces the consumption of physical memory. It is a desirable feature for virtual machines on IaaS (Infrastructure as a Service) type cloud computing, because IaaS hosts many guest OSes which are expected to include many identical memory pages. However, some security capabilities of the guest OS modify memory contents for each execution ...

Journal: :Journal of food protection 2013
Rong Wang Norasak Kalchayanand John W Schmidt Dayna M Harhay

Shiga toxin-producing Escherichia coli O157:H7 and Salmonella enterica serovar Typhimurium are important foodborne pathogens capable of forming single-species biofilms or coexisting in multispecies biofilm communities. Bacterial biofilm cells are usually more resistant to sanitization than their planktonic counterparts, so these foodborne pathogens in biofilms pose a serious food safety concern...

2011
Margus Veanes Nikolaj Bjørner

Symbolic transducers are useful in the context of web security as they form the foundation for sanitization of potentially malicious data. We define Symbolic Tree Transducers as a generalization of Regular Transducers as finite state input-output tree automata with logical constraints over a parametric background theory. We examine key closure properties of Symbolic Tree Transducers and we deve...

2016
Abdulbaki Aydin Lucas Bang Tevfik Bultan

Most common vulnerabilities in Web applications are due to string manipulation errors in input validation and sanitization code. String constraint solvers are essential components of program analysis techniques for detecting and repairing vulnerabilities that are due to string manipulation errors. For quantitative and probabilistic program analyses [1], [2], [3], [4], checking the satisfiabilit...

Journal: :International Journal of Software Engineering and Knowledge Engineering 2015
Hao Sun Chao Su Yue Wang Qingkai Zeng

Integer signedness error can be exploited by attackers to cause severe damages to computer systems. Despite of the significant advances in automating the detection of integer signedness errors, accurately differentiating exploitable and harmful signedness errors from unharmful ones still remains an open problem. In this paper, we present the design and implementation of SignFlow, an instrumenta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید