Alogrithm to prevent and detect insider multi transaction malicious activity in database
Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks are those that come from outside the system, however, insider attacks are those that are launched from insiders of the system. In this thesis is concentrated on insider attacks detection and prevention o...
محفوظ في:
المؤلف الرئيسي: | Khavidaki, Seyyed Mojtaba Dashti |
---|---|
التنسيق: | أطروحة |
اللغة: | English |
منشور في: |
2013
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://eprints.utm.my/id/eprint/36700/1/SeyyedMojtabaDashtiKhavidakiMFSKS2013.pdf http://eprints.utm.my/id/eprint/36700/ http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70076?site_name=Restricted Repository |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
مواد مشابهة
-
Algorithm to prevent and detect insider multi transaction malicious activity in database
بواسطة: Dashti Khavidaki, Seyyed Mojtaba
منشور في: (2013) -
A practical approach in detection and prevention of insider multi transaction malicious activity
بواسطة: Dashti, Mojtaba, وآخرون
منشور في: (2014) -
Detection and prevention of malicious activities on RDBMS relational database management systems
بواسطة: Rashad Al-dhaqm, Arafat Mohammed, وآخرون
منشور في: (2012) -
Malicious website detection
بواسطة: Ong, Vienna Lee
منشور في: (2019) -
User's verification to prevent malicious access in web-based forums
بواسطة: Tabar, Mahdi Taheri, وآخرون
منشور في: (2013)