Skip to search formSkip to main contentSkip to account menu

Data breach

Known as: Spill, Data spill, Data leak 
A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule… 
2012
2012
The k-Means clustering algorithm partition a dataset into meaningful patterns. Intrusion Detection System detects malicious… 
2009
2009
Network Intrusion detection is an area that has received much attention in recent years. Following the anomaly detection approach… 
2009
2009
Aimed at the network intrusion behaviors are characterized with uncertainty, complexity, diversity and dynamic tendency and the… 
2008
2008
E-government is an important issue which integrates existing local area networks into a global network that provide many services… 
2008
2008
Many Critical Infrastructures (CI) use the Internet as a means of providing services to citizens and for dispatching their own… 
2006
2006
New network applications like intrusion detection systems and packet-level accounting require multimatch packet classification… 
2004
2004
Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that… 
2001
2001
This paper explores the use of an artificial immune system (AIS) for network intrusion detection. As one significant component… 
1999
1999
At the Information-technology Promotion Agency (IPA), we have been developing a network intrusion detection system we have named…