About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Risk Scoring in Data Security
(joint project with BGU)
Publications
- Sampling High Throughput Data for Anomaly Detection of Data-Base Activity,
by H. Grushka-Cohen, O. Sofer, O. Biller, M. Dymshits, L. Rokach, B. Shapira, Proceedings of the 11th Pre-ICIS Workshop on Information Security and Privacy, Dublin, Ireland, 2016. - CyberRank- Knowledge Elicitation for Risk Assessment of Database Security,
by Grushka-Cohen H., Sofer O., Biler O., Shapira B., Rokach L., Proc of The 25th ACM International Conference on Information and Knowledge Management (CIKM2016).