The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user’s log file is counted, the most commonly used SC-patterns are filtered out, and then a user’s profile is established. By identifying a user’s SC-patterns as his/her computer usage habits from the user’s current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA’s performance and investigating third-party shell commands.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26401073233
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 395336590
Quantité disponible : 4 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user's log file is counted, the most commonly used SC-patterns are filtered out, and then a user's profile is established. By identifying a user's SC-patterns as his/her computer usage habits from the user's current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA's performance and investigating third-party shell commands. 68 pp. Englisch. N° de réf. du vendeur 9786206686286
Quantité disponible : 2 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18401073243
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user s log file is counted, the most commonly used SC-patterns are filtered out, and . N° de réf. du vendeur 982870163
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user¿s log ¿le is counted, the most commonly used SC-patterns are ¿ltered out, and then a user¿s pröle is established. By identifying a user¿s SC-patterns as his/her computer usage habits from the user¿s current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA¿s performance and investigating third-party shell commands.Books on Demand GmbH, Überseering 33, 22297 Hamburg 68 pp. Englisch. N° de réf. du vendeur 9786206686286
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user's log file is counted, the most commonly used SC-patterns are filtered out, and then a user's profile is established. By identifying a user's SC-patterns as his/her computer usage habits from the user's current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA's performance and investigating third-party shell commands. N° de réf. du vendeur 9786206686286
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. PROVIDING SECURITY AGAINST INSIDER ATTACKS | Divya Raj Vavilala | Taschenbuch | Englisch | 2023 | LAP LAMBERT Academic Publishing | EAN 9786206686286 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de réf. du vendeur 127329327
Quantité disponible : 5 disponible(s)