User-independent and self-optimizing intrusion detection framework for large database systems
Despite various access control approaches, databases are still vulnerable to intruders who are able to bypass these protective methods and access data, or prevent insiders like authorized users who misuse their privilege. To prevent all such intrusions, this study proposes a multilayer profiling met...
| Main Authors: | Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina |
|---|---|
| Format: | Article |
| Published: |
World Scientific and Engineering Academy and Society
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/35941/ |
Similar Items
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)
by: Affendey, Lilly Suriani
Published: (2006)
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
An efficient schema transformation technique for data migration from relational to column-oriented databases
by: Zaidi, Norwini, et al.
Published: (2022)
by: Zaidi, Norwini, et al.
Published: (2022)
A framework for caching relevant data divisions for checking integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A framework for caching relevant data items for checking integrity constraints of mobile database
by: Dzolkhifli, Zarina, et al.
Published: (2008)
by: Dzolkhifli, Zarina, et al.
Published: (2008)
A framework for improving integrity constraints checking of mobile databases by caching relevant data items.
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
Hybrid query for video database system
by: Affendey, Lilly Suriani, et al.
Published: (2008)
by: Affendey, Lilly Suriani, et al.
Published: (2008)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Content-based image retrieval using transfer learning and vector database
by: Shuo, Li, et al.
Published: (2022)
by: Shuo, Li, et al.
Published: (2022)
Video concept detection using Hadoop MapReduce framework
by: Affendey, Lilly Suriani, et al.
Published: (2014)
by: Affendey, Lilly Suriani, et al.
Published: (2014)
A framework for checking and ranking integrity constraints in a distributed database
by: Alwan, Ali Amer, et al.
Published: (2011)
by: Alwan, Ali Amer, et al.
Published: (2011)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
3-L model: a model for checking the integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
A new clustering approach for group detection in scene-independent dense crowds
by: Wong, Pei Voon, et al.
Published: (2016)
by: Wong, Pei Voon, et al.
Published: (2016)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Road crash injury severity prediction using a graph neural network framework
by: Sattar, Karim A., et al.
Published: (2024)
by: Sattar, Karim A., et al.
Published: (2024)
Data visualization for agricultural data: benefits and challenges
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Enhancing truth discovery in document context finding using NER – based veracity evaluator framework
by: Azman, Siti Nuradilah, et al.
Published: (2015)
by: Azman, Siti Nuradilah, et al.
Published: (2015)
Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression
by: Mehdi, Osama A., et al.
Published: (2018)
by: Mehdi, Osama A., et al.
Published: (2018)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
A framework for processing skyline queries for a group of mobile users
by: Babanejad Dehaki, Ghonched, et al.
Published: (2018)
by: Babanejad Dehaki, Ghonched, et al.
Published: (2018)
A system literature review on evolution of big data analytics application
by: Adrian, Cecilia, et al.
Published: (2015)
by: Adrian, Cecilia, et al.
Published: (2015)
Missing values estimation for skylines in incomplete database
by: Alwan, Ali, et al.
Published: (2018)
by: Alwan, Ali, et al.
Published: (2018)
Automatic video annotation framework using concept detectors
by: Chamasemani, Fereshteh Falah, et al.
Published: (2015)
by: Chamasemani, Fereshteh Falah, et al.
Published: (2015)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A crowd video retrieval framework using generic descriptors
by: Wong, Pei Voon, et al.
Published: (2020)
by: Wong, Pei Voon, et al.
Published: (2020)
Big data analytic application framework for Malaysian palm oil industry
by: Ishak, Iskandar, et al.
Published: (2014)
by: Ishak, Iskandar, et al.
Published: (2014)
Processing skyline queries in incomplete distributed databases
by: Alwan, Ali Amer, et al.
Published: (2016)
by: Alwan, Ali Amer, et al.
Published: (2016)
Processing skyline queries in incomplete distributed databases
by: Alwan, Ali Amer, et al.
Published: (2016)
by: Alwan, Ali Amer, et al.
Published: (2016)
Estimating missing values of skylines in incomplete database
by: Alwan, Ali A., et al.
Published: (2013)
by: Alwan, Ali A., et al.
Published: (2013)
Preference evaluation techniques of preference queries in database
by: Alwan, Ali A., et al.
Published: (2013)
by: Alwan, Ali A., et al.
Published: (2013)
Skyline queries over incomplete multidimensional database
by: Alwan, Ali Amer, et al.
Published: (2011)
by: Alwan, Ali Amer, et al.
Published: (2011)
Similar Items
-
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014) -
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006) -
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012) -
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013) -
An efficient schema transformation technique for data migration from relational to column-oriented databases
by: Zaidi, Norwini, et al.
Published: (2022)