Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Oded Sofer"'
Publikováno v:
AAAI
Scopus-Elsevier
Scopus-Elsevier
We propose a hybrid approach to temporal anomaly detection in access data of users to databases --- or more generally, any kind of subject-object co-occurrence data. We consider a high-dimensional setting that also requires fast computation at test t
Publikováno v:
Advances in Knowledge Discovery and Data Mining ISBN: 9783030474355
PAKDD (2)
PAKDD (2)
Database activity monitoring systems aim to protect organizational data by logging users’ activity to Identify and document malicious activity. High-velocity streams and operating costs, restrict these systems to examining only a sample of the acti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf51eab4e54705f195eec7edc6b97693
https://doi.org/10.1007/978-3-030-47436-2_53
https://doi.org/10.1007/978-3-030-47436-2_53
Publikováno v:
Human-Computer Interaction – INTERACT 2019 ISBN: 9783030293802
INTERACT (1)
INTERACT (1)
Visualization tools are critical components of cyber security systems allowing analyzers to better understand, detect and prevent security breaches. Security administrators need to understand which users accessed the database and what operations were
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b40f473ab4e23c93c0f31ac5dd088ec
https://doi.org/10.1007/978-3-030-29381-9_31
https://doi.org/10.1007/978-3-030-29381-9_31
Publikováno v:
Policy-Based Autonomic Data Governance ISBN: 9783030172763
PADG@ESORICS
PADG@ESORICS
Monitoring database activity is useful for identifying and preventing data breaches. Such database activity monitoring (DAM) systems use anomaly detection algorithms to alert security officers to possible infractions. However, the sheer number of tra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f35839370031178135df86b3a28bf268
https://doi.org/10.1007/978-3-030-17277-0_5
https://doi.org/10.1007/978-3-030-17277-0_5
Publikováno v:
CIKM
Security systems for databases produce numerous alerts about anomalous activities and policy rule violations. Prioritizing these alerts will help security personnel focus their efforts on the most urgent alerts. Currently, this is done manually by se