Implementing severity factor to mitigate malicious insider
Nowadays, the use of XML database is expending. XML is designed to store and transport data. A large quantity of information is presented in XML format on the web for easy transportation. Due to the increased use of XML database over the web, the need to protect this database is vital. In a multiuse...
| Main Authors: | Asmawi, Aziah, Affendey, Lilly Suriani, Udzir, Nur Izura, Mahmod, Ramlan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/80178/ http://psasir.upm.edu.my/id/eprint/80178/1/Implementing%20Severity%20Factor%20to%20Mitigate%20Malicious%20Insider.pdf |
Similar Items
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
The Role Of Investor Protection And Corporate Governance In Mitigating Insider Trading
by: Lye, Chun Teck
Published: (2017)
by: Lye, Chun Teck
Published: (2017)
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Malicious software prevention for Muslim communities
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)
by: Affendey, Lilly Suriani
Published: (2006)
Road crash injury severity prediction using a graph neural network framework
by: Sattar, Karim A., et al.
Published: (2024)
by: Sattar, Karim A., et al.
Published: (2024)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Improving malicious detection rate for Facebook application in OSN platform
by: Angamuthu, Laavanya
Published: (2018)
by: Angamuthu, Laavanya
Published: (2018)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020)
by: Ridha, Hussein Ali
Published: (2020)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Inside the Dance
by: Bender, Stuart
Published: (2012)
by: Bender, Stuart
Published: (2012)
Impact of mobile context-aware applications on human computer interaction
by: Chamasemani, Fereshteh Falah, et al.
Published: (2014)
by: Chamasemani, Fereshteh Falah, et al.
Published: (2014)
Systematic review and classification of video surveillance systems.
by: Chamasemani, Fereshteh Falah, et al.
Published: (2013)
by: Chamasemani, Fereshteh Falah, et al.
Published: (2013)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Similar Items
-
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012) -
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013) -
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012) -
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018) -
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)