Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
Dynamic network models for forecasting
UAI '92 Proceedings of the eighth conference on Uncertainty in Artificial Intelligence
ACM Computing Surveys (CSUR)
Probabilistic independence networks for hidden Markov probability models
Neural Computation
Factorial Hidden Markov Models
Machine Learning - Special issue on learning with probabilistic representations
Speech recognition with dynamic Bayesian networks
AAAI '98/IAAI '98 Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence
Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Fall Diagnosis using Dynamic Belief Networks
PRICAI '96 Proceedings of the 4th Pacific Rim International Conference on Artificial Intelligence: Topics in Artificial Intelligence
An Effective HMM-Based Intrusion Detection System with Privilege Change Event Modeling
PRICAI '02 Proceedings of the 7th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
Data Level Inference Detection in Database Systems
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Detection and Elimination of Inference Channels in Multilevel Relational Database Systems
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Bayesian Event Classification for Intrusion Detection
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Privacy management for portable recording devices
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Conflict and combination in privacy policy languages
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
HMM profiles for network traffic classification
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
An Audit Logic for Accountability
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Dynamic Bayesian networks for audio-visual speech recognition
EURASIP Journal on Applied Signal Processing
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Probabilistic temporal reasoning with endogenous change
UAI'95 Proceedings of the Eleventh conference on Uncertainty in artificial intelligence
Active affective State detection and user assistance with dynamic bayesian networks
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Measuring network security using dynamic bayesian network
Proceedings of the 4th ACM workshop on Quality of protection
Hi-index | 0.00 |
Concerns for personal information privacy could be produced during information collection, transmission and handling. In information handling, privacy could be compromised from both inside and outside of organizations. Within an organization, private data are generally protected by organizations' privacy policies and the corresponding platforms for privacy practices. However, private data could still be misused intentionally or unintentionally by individuals who have legitimate accesses to them. In general, activities of a database operator form a stochastic process, and at different time, privacy intrusion behavior may show different features. In particular, one's past activities can help determine the natures of his/her current practices. In this paper, we propose to use dynamic Bayesian networks to model such temporal environments and detect any privacy intrusions happened within them.