Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,554,471 papers from all fields of science
Search
Sign In
Create Free Account
Data breach
Known as:
Spill
, Data spill
, Data leak
Expand
A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
4chan
Computer security
Credential stuffing
Cthulhu (developer)
Expand
Broader (2)
Data security
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Hybrid Approach for Network Intrusion Detection System Using Random Forest Classifier and Rough Set Theory for Rules Generation
Nilesh B. Nanda
,
A. Parikh
Communications in Computer and Information…
2019
Corpus ID: 203706898
One of the most dangerous aspects that the computer world glimpses are threats to security. It estimated that about 3 billion…
Expand
2016
2016
A feature selection approach to find optimal feature subsets for the network intrusion detection system
Seung-Ho Kang
,
Kuinam J. Kim
Cluster Computing
2016
Corpus ID: 254380087
The performance of network intrusion detection systems based on machine learning techniques in terms of accuracy and efficiency…
Expand
2013
2013
Real-time intrusion detection with fuzzy genetic algorithm
P. Jongsuebsuk
,
N. Wattanapongsakorn
,
C. Charnsripinyo
International Conference on Electrical…
2013
Corpus ID: 17276652
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule…
Expand
2012
2012
Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K – Means Algorithms
M. V. Rao
,
A. Damodaram
,
N.Ch.
,
Bhatra Charyulu
2012
Corpus ID: 57978548
The k-Means clustering algorithm partition a dataset into meaningful patterns. Intrusion Detection System detects malicious…
Expand
2012
2012
Supporting tourism decision making with linked data
M. Sabou
,
Adrian M. P. Braşoveanu
,
Irem Arsal
International Conference on Semantic Systems
2012
Corpus ID: 16647931
Decision makers in the tourism domain routinely need to combine and compare statistical indicators about tourism and other…
Expand
2011
2011
Identification of correlated network intrusion alerts
Mirco Marchetti
,
M. Colajanni
,
Fabio Manganiello
International Conference on Cryptography and…
2011
Corpus ID: 9011288
Attacks to information systems are becoming more sophisticated and traditional algorithms supporting Network Intrusion Detection…
Expand
2006
2006
Efficient Multimatch Packet Classification for Network Security Applications
Fang Yu
,
T. V. Lakshman
,
Marti A. Motoyama
,
R. Katz
IEEE Journal on Selected Areas in Communications
2006
Corpus ID: 27453201
New network applications like intrusion detection systems and packet-level accounting require multimatch packet classification…
Expand
2004
2004
Mining Temporally Changing Web Usage Graphs
P. Desikan
,
J. Srivastava
Web Mining and Web Usage Analysis
2004
Corpus ID: 30799298
Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that…
Expand
2003
2003
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
J. Lockwood
,
Christopher E. Neely
,
Christopher K. Zuver
,
James Moscola
,
Sarang Dharmapurikar
,
David Lim
International Conference on Field-Programmable…
2003
Corpus ID: 1672194
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet…
Expand
Review
2002
Review
2002
Synthesis of the toxicological impacts of the Exxon Valdez oil spill on Pacific herring (Clupea pallasi) in Prince William Sound, Alaska, U.S.A.
M. Carls
,
G. Marty
,
J. Hose
2002
Corpus ID: 14073842
Pacific herring (Clupea pallasi) in Prince William Sound (PWS) were affected by two major events in the past decade: the Exxon…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE