Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Database activity monitoring"'
Autor:
Lakshmi Narasimhan G.
Publikováno v:
EAI Endorsed Transactions on Cloud Systems, Vol 3, Iss 11 (2018)
For the past four decades, the traditional relational databases have been in use in Information Technology industry. There was a phenomenal conversion in the IT industry in terms of commercial applications in the previous years. The applications that
Externí odkaz:
https://doaj.org/article/86c91977540c4ca2b8b636dc50539048
Publikováno v:
Advances in Knowledge Discovery and Data Mining
Database activity monitoring systems aim to protect organizational data by logging users’ activity to Identify and document malicious activity. High-velocity streams and operating costs, restrict these systems to examining only a sample of the acti
Autor:
Kalibjian, J. R.
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
As organizations move toward cloud [1] computing environme
As organizations move toward cloud [1] computing environme
Externí odkaz:
http://hdl.handle.net/10150/595799
Publikováno v:
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
AsiaCCS
AsiaCCS
Honeywords are false passwords injected in a database for detecting password leakage. Generating honeywords is a challenging problem due to the various assumptions about the adversary’s knowledge as well as users’ password-selection behaviour. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0764d0cbc4bf4bf809ed041ab4b1691e
https://zenodo.org/record/5082032
https://zenodo.org/record/5082032
Publikováno v:
Advances in Knowledge Discovery and Data Mining ISBN: 9783030474355
PAKDD (2)
PAKDD (2)
Database activity monitoring systems aim to protect organizational data by logging users’ activity to Identify and document malicious activity. High-velocity streams and operating costs, restrict these systems to examining only a sample of the acti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf51eab4e54705f195eec7edc6b97693
https://doi.org/10.1007/978-3-030-47436-2_53
https://doi.org/10.1007/978-3-030-47436-2_53
Publikováno v:
WI
Data Integrity (DI) is the ability to ensure that a data retrieved from a database is the same as that stored and processed. It is a major component of data security and has an important role for the quality of decision making. While most of the exis
Publikováno v:
Policy-Based Autonomic Data Governance ISBN: 9783030172763
PADG@ESORICS
PADG@ESORICS
Monitoring database activity is useful for identifying and preventing data breaches. Such database activity monitoring (DAM) systems use anomaly detection algorithms to alert security officers to possible infractions. However, the sheer number of tra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f35839370031178135df86b3a28bf268
https://doi.org/10.1007/978-3-030-17277-0_5
https://doi.org/10.1007/978-3-030-17277-0_5
Autor:
G Lakshmi Narasimhan
Publikováno v:
EAI Endorsed Transactions on Cloud Systems, Vol 3, Iss 11 (2018)
For the past four decades, the traditional relational databases have been in use in Information Technology industry. There was a phenomenal conversion in the IT industry in terms of commercial applications in the previous years. The applications that
Autor:
Dongseop Mun, Suk-Ho Kang, Nam-Wook Cho, Seung Jo Kim, Taewan Kim, Young-Joo Lee, Hyeseon Hwang
Publikováno v:
Information Systems Frontiers. 15:55-65
To prevent internal data leakage, database activity monitoring uses software agents to analyze protocol traffic over networks and to observe local database activities. However, the large size of data obtained from database activity monitoring has pre
Autor:
Ron Natan
Publikováno v:
HOWTO Secure and Audit Oracle 10g and 11g ISBN: 9780429132568
HOWTO Secure and Audit Oracle 10g and 11g
HOWTO Secure and Audit Oracle 10g and 11g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::71c4bcd2abcaf96dcd380b842bd67c5f
https://doi.org/10.1201/b10306-15
https://doi.org/10.1201/b10306-15