Now showing items 1-4 of 4
Detecting Data Exfiltration by Integrating Information Across Layers
Data exfiltration is the unauthorized leakage of confidential data from a system. Unlike intrusions that seek to overtly disable or damage a system, it is particularly hard to detect because it uses a variety of low/slow ...
ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones
Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and context leakage ...
Extracting cybersecurity related linked data from text
(IEEE Computer Society Press, 2013-09-16)
The Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, ...
Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy
Pointwise mutual information (PMI) is a widely used word similarity measure, but it lacks a clear explanation of how it works. We explore how PMI differs from distributional similarity, and we introduce a novel metric, ...