The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user’s log file is counted, the most commonly used SC-patterns are filtered out, and then a user’s profile is established. By identifying a user’s SC-patterns as his/her computer usage habits from the user’s current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA’s performance and investigating third-party shell commands.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. Bestandsnummer des Verkäufers 26401073233
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand. Bestandsnummer des Verkäufers 395336590
Anzahl: 4 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user's log file is counted, the most commonly used SC-patterns are filtered out, and then a user's profile is established. By identifying a user's SC-patterns as his/her computer usage habits from the user's current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA's performance and investigating third-party shell commands. 68 pp. Englisch. Bestandsnummer des Verkäufers 9786206686286
Anzahl: 2 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND. Bestandsnummer des Verkäufers 18401073243
Anzahl: 4 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user s log file is counted, the most commonly used SC-patterns are filtered out, and . Bestandsnummer des Verkäufers 982870163
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user¿s log ¿le is counted, the most commonly used SC-patterns are ¿ltered out, and then a user¿s pröle is established. By identifying a user¿s SC-patterns as his/her computer usage habits from the user¿s current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA¿s performance and investigating third-party shell commands.Books on Demand GmbH, Überseering 33, 22297 Hamburg 68 pp. Englisch. Bestandsnummer des Verkäufers 9786206686286
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The proposed approach employs data mining and forensic techniques to identify the representative SC-patterns for a user. The time that a habitual SC pattern appears in the user's log file is counted, the most commonly used SC-patterns are filtered out, and then a user's profile is established. By identifying a user's SC-patterns as his/her computer usage habits from the user's current input SCs, the PSAIA resists suspected attackers. The experimental results demonstrate that the average detection accuracy is higher than 94% when the decisive rate threshold is 0.9, indicating that the PSAIA can assist system administrators to point out an insider or an attacker in a closed environment. The further study will be done by improving PSAIA's performance and investigating third-party shell commands. Bestandsnummer des Verkäufers 9786206686286
Anzahl: 1 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. PROVIDING SECURITY AGAINST INSIDER ATTACKS | Divya Raj Vavilala | Taschenbuch | Englisch | 2023 | LAP LAMBERT Academic Publishing | EAN 9786206686286 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. Bestandsnummer des Verkäufers 127329327
Anzahl: 5 verfügbar