Assessing modular structure of legacy code based on mathematical concept analysis
ICSE '97 Proceedings of the 19th international conference on Software engineering
Formal Concept Analysis: Mathematical Foundations
Formal Concept Analysis: Mathematical Foundations
Conceptual Information Systems Discussed through in IT-Security Tool
EKAW '00 Proceedings of the 12th European Workshop on Knowledge Acquisition, Modeling and Management
Interpretation of Automata in Temporal Concept Analysis
ICCS '02 Proceedings of the 10th International Conference on Conceptual Structures: Integration and Interfaces
Building and Exploiting Ad Hoc Concept Hierarchies for Web Log Analysis
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
ICSE '07 Proceedings of the 29th international conference on Software Engineering
A Practical Attack to De-anonymize Social Network Users
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
The beauty and the beast: vulnerabilities in red hat’s packages
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
An analysis of private browsing modes in modern browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Data weeding techniques applied to Roget's thesaurus
KONT'07/KPP'07 Proceedings of the First international conference on Knowledge processing and data analysis
Concept neighbourhoods in lexical databases
ICFCA'10 Proceedings of the 8th international conference on Formal Concept Analysis
Hi-index | 0.00 |
There are many existing software tools for identifying specific and severe IT security threats (virus checkers, firewalls). But it is more difficult to detect less severe and more general problems, such as disclosure of sensitive or private data. In theory, security problems could be detected with existing tools, but the amount of information provided is often too overwhelming. FCA is a promising technology in this application area because it helps to reduce and explore data without prescribing what it is that is searched for from the start. This paper demonstrates the use of FCA for analysing Unix system data with respect to IT security monitoring.