Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
Welcome to KDD-2013’s online program
View analytic
Tuesday, August 13 • 5:00pm - 6:30pm
Industry Government Session 7: Security

Sign up or log in to save this to your schedule and see who's attending!

769 An Integrated Framework for Optimizing Automatic Monitoring Systems in Large IT Infrastructures
Authors: Liang Tang, Florida International Univ; Tao Li, Florida International University; Larisa Shwartz, IBM Research; Florian Pinel, IBM Research; Genady Grabarnik, St. Johns University

960 Detecting Insider Threats in a Real Corporate Database of Computer Usage Activities
Authors: Ted Senator, SAIC Henry Goldberg, SAIC Alex Memory, William Young, SAIC Bradley Rees, Robert Pierce, SAIC Daniel Huang, SAIC Matthew Reardon, SAIC David Bader, Ga Tech Edmond Chow, Ga Tech Irfan Essa, Georgia Institute of Technology Joshua Jones, Ga Tech Vinay Bettadapura, Georgia Institute of Technology Duen Horng Chau, Georgia Institute of Technology Oded Green, Ga Tech Oguz Kaya, Ga Tech Anita Zakrzewska, Ga Tech Erica Briscoe, GTRI Rudolph Mappus IV, GTRI Robert McColl, GTRI Lora Weiss, GTRI Thomas Dietterich, Oregon State University Alan Fern, Oregon State University Weng-Keen Wong, Oregon State University Shubhomoy Das, Oregon State University Andrew Emmott, Oregon State University Jed Irvine, Oregon State University Jay-Yoon Lee, CMU Danai Koutra, Carnegie Mellon University Christos Faloutsos, CMU Daniel Corkill, University of Massachusetts Lisa Friedland, University of Massachusetts Amanda Gentzel, University of Massachusetts David Jensen, Univ of Massachusetts Amherst

825 Efficiently Rewriting Large Multimedia Application Execution Traces with few Event Sequences
Authors: Christiane Kamdem Kengne, UJF/LIG; Leon Constantin Fopa; alexandre Termier; Noha Ibrahim; Marie-Christine Rousset;Takashi Washio, Osaka University ;Miguel Santana

1128 Discriminant Malware Distance Learning on Structural Information for Automated Malware Classification
Authors: Deguang Kong, University of Texas at Arlington; Guanhua Yan, Los Alamos National Laboratory 702 A Privacy Preserving Framework for Managing Vehicle Data in Road Pricing Systems Authors: Huayu Wu, Institute for Infocomm Research; Wee Siong Ng, Institute for Infocomm Research; Kian-Lee Tan, National University of Singapore; Wei Wu , Institute for Infocomm Research; Shili Xiang, Institute for Infocomm Research; Mingqiang Xue, Institute for Infocomm Research

Tuesday August 13, 2013 5:00pm - 6:30pm
Michigan

Attendees (3)