咨询与建议

限定检索结果

文献类型

  • 3 篇 会议

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 电气工程

主题

  • 3 篇 insider threats
  • 3 篇 anomaly detectio...
  • 3 篇 temporal attacks
  • 3 篇 data analytics f...
  • 3 篇 relational datab...
  • 1 篇 periodicity
  • 1 篇 time series

机构

  • 2 篇 purdue univ dept...
  • 1 篇 purdue univ dept...

作者

  • 3 篇 sallam asmaa
  • 3 篇 bertino elisa

语言

  • 3 篇 英文
检索条件"主题词=Data Analytics for Security"
3 条 记 录,以下是1-10 订阅
排序:
Result-Based Detection of Insider Threats to Relational databases  19
Result-Based Detection of Insider Threats to Relational Data...
收藏 引用
9th ACM Conference on data and Application security and Privacy (CODASPY)
作者: Sallam, Asmaa Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47906 USA
Insiders misuse of resources is a real threat to organizations. According to recent security reports, data has been the most vulnerable to attacks by insiders, especially data located in databases and corporate file s... 详细信息
来源: 评论
Detection of Temporal data Ex-filtration Threats to Relational databases  4
Detection of Temporal Data Ex-filtration Threats to Relation...
收藏 引用
4th IEEE International Conference on Collaboration and Internet Computing (CIC)
作者: Sallam, Asmaa Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
According to recent reports, the most common insider threats to systems are unauthorized access to or use of corporate information and exposure of sensitive data. While anomaly detection techniques have proved to be e... 详细信息
来源: 评论
Detection of Temporal Insider Threats to Relational databases  3
Detection of Temporal Insider Threats to Relational Database...
收藏 引用
3rd IEEE International Conference on Collaboration and Internet Computing (CIC)
作者: Sallam, Asmaa Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
The mitigation of insider threats against databases is a challenging problem as insiders often have legitimate access privileges to sensitive data. Therefore, conventional security mechanisms, such as authentication a... 详细信息
来源: 评论