Shadows in the Cloud

Submitted by Katie Dey on

Investigating Cyber Espionage

 

JOINT REPORT:

Information Warfare Monitor

Shadowserver Foudnation

April 6, 2010

WEB VERSION. Also found here: http://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0

On the Efficacy of Data Mining for Security Applications

Submitted by Katie Dey on

Abstract

Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several of the more common criticisms and analyzes some factors that bear on whether the criticisms are valid and/or can be overcome by appropriate design and use of the data mining application.

 

Subscribe to