Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,554,363 papers from all fields of science
Search
Sign In
Create Free Account
Data breach
Known as:
Spill
, Data spill
, Data leak
Expand
A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
4chan
Computer security
Credential stuffing
Cthulhu (developer)
Expand
Broader (2)
Data security
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Real-time intrusion detection with fuzzy genetic algorithm
P. Jongsuebsuk
,
N. Wattanapongsakorn
,
C. Charnsripinyo
International Conference on Electrical…
2013
Corpus ID: 17276652
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule…
Expand
2012
2012
Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K – Means Algorithms
M. V. Rao
,
A. Damodaram
,
N.Ch.
,
Bhatra Charyulu
2012
Corpus ID: 57978548
The k-Means clustering algorithm partition a dataset into meaningful patterns. Intrusion Detection System detects malicious…
Expand
2009
2009
A Weighted Support Vector Clustering Algorithm and its Application in Network Intrusion Detection
Sheng Sun
,
Yuanzhen Wang
First International Workshop on Education…
2009
Corpus ID: 18503105
Network Intrusion detection is an area that has received much attention in recent years. Following the anomaly detection approach…
Expand
2009
2009
Network Intrusion Detection Method Based on Radial Basic Function Neural Network
Jingwen Tian
,
Meijuan Gao
,
Fan Zhang
International Conference on E-Business and…
2009
Corpus ID: 18870065
Aimed at the network intrusion behaviors are characterized with uncertainty, complexity, diversity and dynamic tendency and the…
Expand
2008
2008
A real-time intrusion detection algorithm for network security
H. El-Bakry
,
N. Mastorakis
2008
Corpus ID: 14235599
E-government is an important issue which integrates existing local area networks into a global network that provide many services…
Expand
2008
2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures
Rami Puzis
,
Marius David Klippel
,
Y. Elovici
,
S. Dolev
European Conference on Intelligence and Security…
2008
Corpus ID: 1843774
Many Critical Infrastructures (CI) use the Internet as a means of providing services to citizens and for dispatching their own…
Expand
2006
2006
Efficient Multimatch Packet Classification for Network Security Applications
Fang Yu
,
T. V. Lakshman
,
Marti A. Motoyama
,
R. Katz
IEEE Journal on Selected Areas in Communications
2006
Corpus ID: 27453201
New network applications like intrusion detection systems and packet-level accounting require multimatch packet classification…
Expand
2004
2004
Mining Temporally Changing Web Usage Graphs
P. Desikan
,
J. Srivastava
Web Mining and Web Usage Analysis
2004
Corpus ID: 30799298
Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that…
Expand
2001
2001
The Artificial Immune System for Network Intrusion Detection : An Investigation of Clonal Selection with a Negative Selection Operator
Jungwon Kim
,
P. Bentley
2001
Corpus ID: 16590159
This paper explores the use of an artificial immune system (AIS) for network intrusion detection. As one significant component…
Expand
1999
1999
The Implementation of IDA: An Intrusion Detection Agent System
A. Taguchi
,
Midori Asaka
,
Shigeki Goto
1999
Corpus ID: 14734260
At the Information-technology Promotion Agency (IPA), we have been developing a network intrusion detection system we have named…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE