Research on Database Anomaly Access Detection Based on User Profile Construction

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FCS (3. : 2020 : Tientsin; Online) Frontiers in cyber security
1. Verfasser: Wang, Xuren (VerfasserIn)
Weitere Verfasser: Fang, Zhou (VerfasserIn), Wang, Dong (VerfasserIn), Feng, Anran (VerfasserIn), Wang, Qiuyun (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT 2020 Xie, Mande
Analysis Model of Node Failures and Impact for AANET 2020 Xie, Lixia
Data Auditing for the Internet of Things Environments Leveraging Smart Contract 2020 Peng, Fang
Design of Personal Credit Information Sharing Platform Based on Consortium Blockchain 2020 Zhang, Jing
Dynamic Trajectory for Visual Perception of Abnormal Behavior 2020 Zhang, Changqi
Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks 2020 Peng, Hao
Fuzzy Petri Nets Based Information System Security Situation Assessment Model 2020 Yang, Hongyu
DPC: A Delay-Driven Prioritized TCP Congestion Control Algorithm for Data Center Networks 2020 Jiang, Xianliang
Low-Speed Injection Attack Detection on CAN Bus 2020 Wang, Chundong
DNS Rebinding Detection for Local Internet of Things Devices 2020 He, Xudong
Defending Poisoning Attacks in Federated Learning via Adversarial Training Method 2020 Zhang, Jiale
Noninvasive Research on Cardiac Electrical Activity by Non-Gaussian Prior Bayesian Matching Pursuit 2020 Bing, Lu
Video Investigation Analysis System Enhanced by Explicable Model 2020 Xing, Jun
Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular Networks 2020 Tan, Chenkai
Detecting Intrusions in Railway Signal Safety Data Networks with DBSCAN-ARIMA 2020 Fan, Yuming
Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies 2020 Peng, Hao
A Security Problem Caused by the State Database in Hyperledger Fabric 2020 Gao, Zhen
Identify-Based Outsourcing Data Auditing Scheme with Lattice 2020 Wang, Han
An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation 2020 Zhou, Chao
A Network Traffic Classification Method Based on Hierarchical Clustering 2020 Ma, Yong
Alle Artikel auflisten