Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Oded Sofer"'
Publikováno v:
AAAI
Scopus-Elsevier
Scopus-Elsevier
We propose a hybrid approach to temporal anomaly detection in access data of users to databases --- or more generally, any kind of subject-object co-occurrence data. We consider a high-dimensional setting that also requires fast computation at test t
Publikováno v:
Advances in Knowledge Discovery and Data Mining ISBN: 9783030474355
PAKDD (2)
PAKDD (2)
Database activity monitoring systems aim to protect organizational data by logging users’ activity to Identify and document malicious activity. High-velocity streams and operating costs, restrict these systems to examining only a sample of the acti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf51eab4e54705f195eec7edc6b97693
https://doi.org/10.1007/978-3-030-47436-2_53
https://doi.org/10.1007/978-3-030-47436-2_53
Publikováno v:
Human-Computer Interaction – INTERACT 2019 ISBN: 9783030293802
INTERACT (1)
INTERACT (1)
Visualization tools are critical components of cyber security systems allowing analyzers to better understand, detect and prevent security breaches. Security administrators need to understand which users accessed the database and what operations were
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b40f473ab4e23c93c0f31ac5dd088ec
https://doi.org/10.1007/978-3-030-29381-9_31
https://doi.org/10.1007/978-3-030-29381-9_31
Publikováno v:
Policy-Based Autonomic Data Governance ISBN: 9783030172763
PADG@ESORICS
PADG@ESORICS
Monitoring database activity is useful for identifying and preventing data breaches. Such database activity monitoring (DAM) systems use anomaly detection algorithms to alert security officers to possible infractions. However, the sheer number of tra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f35839370031178135df86b3a28bf268
https://doi.org/10.1007/978-3-030-17277-0_5
https://doi.org/10.1007/978-3-030-17277-0_5
Publikováno v:
CIKM
Security systems for databases produce numerous alerts about anomalous activities and policy rule violations. Prioritizing these alerts will help security personnel focus their efforts on the most urgent alerts. Currently, this is done manually by se
Autor:
Hady W. Lauw, Raymond Chi-Wing Wong, Alexandros Ntoulas, Ee-Peng Lim, See-Kiong Ng, Sinno Jialin Pan
The two-volume set LNAI 12084 and 12085 constitutes the thoroughly refereed proceedings of the 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2020, which was due to be held in Singapore, in May 2020. The conference was hel
Autor:
David Lamas, Fernando Loizides, Lennart Nacke, Helen Petrie, Marco Winckler, Panayiotis Zaphiris
The four-volume set LNCS 11746–11749 constitutes the proceedings of the 17th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2019, held in Paphos, Cyprus, in September 2019. The total of 111 full papers presented togethe
Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous