Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2016
CyberRank: Knowledge Elicitation for Risk Assessment of Database Security
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 2009–2012https://doi.org/10.1145/2983323.2983896Security systems for databases produce numerous alerts about anomalous activities and policy rule violations. Prioritizing these alerts will help security personnel focus their efforts on the most urgent alerts. Currently, this is done manually by ...
- research-articleOctober 2016
Semi-supervised Multi-Label Topic Models for Document Classification and Sentence Labeling
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 105–114https://doi.org/10.1145/2983323.2983752Extracting parts of a text document relevant to a class label is a critical information retrieval task. We propose a semi-supervised multi-label topic model for jointly achieving document and sentence-level class inferences. Under our model, each ...
- research-articleOctober 2016
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 2395–2400https://doi.org/10.1145/2983323.2983700Malware detection has been widely studied by analysing either file dropping relationships or characteristics of the file distribution network. This paper, for the first time, studies a global heterogeneous malware delivery graph fusing file dropping ...
- research-articleOctober 2016
Discriminative View Learning for Single View Co-Training
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 2221–2226https://doi.org/10.1145/2983323.2983671Co-training, a popular semi-supervised learning technique, is severely limited as it applicable only to datasets which have a natural division of the feature space into two or more distinct views. In this paper, we investigate techniques to apply co-...