It is shown that in this paper that behavioural-based anomaly detection approaches have the potential to detect privacy attacks based on query sequences (violation of formal privacy definition) as privacy-anomalies.
Anomaly Detection Cryptography and Security
no code implementations • 12 Oct 2015 • Christian Bessiere, Luc De Raedt, Tias Guns, Lars Kotthoff, Mirco Nanni, Siegfried Nijssen, Barry O'Sullivan, Anastasia Paparrizou, Dino Pedreschi, Helmut Simonis
Constraint programming is used for a variety of real-world optimisation problems, such as planning, scheduling and resource allocation problems.
Moreover, we show that the maximum number of pairs of equal variables can be approximated by a factor 1/2 with a linear time greedy algorithm.
Call control features (e. g., call-divert, voice-mail) are primitive options to which users can subscribe off-line to personalise their service.