Skip to search formSkip to main contentSkip to account menu

Data breach

Known as: Spill, Data spill, Data leak 
A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
One of the most dangerous aspects that the computer world glimpses are threats to security. It estimated that about 3 billion… 
2016
2016
The performance of network intrusion detection systems based on machine learning techniques in terms of accuracy and efficiency… 
2013
2013
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule… 
2012
2012
The k-Means clustering algorithm partition a dataset into meaningful patterns. Intrusion Detection System detects malicious… 
2012
2012
Decision makers in the tourism domain routinely need to combine and compare statistical indicators about tourism and other… 
2011
2011
Attacks to information systems are becoming more sophisticated and traditional algorithms supporting Network Intrusion Detection… 
2006
2006
New network applications like intrusion detection systems and packet-level accounting require multimatch packet classification… 
2004
2004
Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that… 
2003
2003
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet… 
Review
2002
Review
2002
Pacific herring (Clupea pallasi) in Prince William Sound (PWS) were affected by two major events in the past decade: the Exxon…