Research on artificial intelligence enhancing internet of things security: A survey

H Wu, H Han, X Wang, S Sun - Ieee Access, 2020 - ieeexplore.ieee.org
Through three development routes of authentication, communication, and computing, the
Internet of Things (IoT) has become a variety of innovative integrated solutions for specific …

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

A Verma, R Saha, N Kumar, G Kumar - Multimedia Tools and Applications, 2022 - Springer
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …

[BUKU][B] Data leakage detection/prevention solutions

A Shabtai, Y Elovici, L Rokach, A Shabtai, Y Elovici… - 2012 - Springer
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …

Automatic training of a database intrusion detection system

A Bromwich - US Patent 8,046,374, 2011 - Google Patents
(57) ABSTRACT A database intrusion detection system (DIDS) automatically trains itself to
account for changes to the database. The DIDS monitors upstream queries sent to the …

Detecting anomalous access patterns in relational databases

A Kamra, E Terzi, E Bertino - The VLDB Journal, 2008 - Springer
A considerable effort has been recently devoted to the development of Database
Management Systems (DBMS) which guarantee high assurance and security. An important …

A data-centric approach to insider attack detection in database systems

S Mathew, M Petropoulos, HQ Ngo… - Recent Advances in …, 2010 - Springer
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …

A data mining approach for database intrusion detection

Y Hu, B Panda - Proceedings of the 2004 ACM symposium on Applied …, 2004 - dl.acm.org
In this paper we proposed a data mining approach for detecting malicious transactions in a
Database System. Our approach concentrates on mining data dependencies among data …

Intrusion detection in RBAC-administered databases

E Bertino, E Terzi, A Kamra… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
A considerable effort has been recently devoted to the development of database
management systems (DBMS) which guarantee high assurance security and privacy. An …

An adaptive risk management and access control framework to mitigate insider threats

N Baracaldo, J Joshi - Computers & Security, 2013 - Elsevier
Insider Attacks are one of the most dangerous threats organizations face today. An insider
attack occurs when a person authorized to perform certain actions in an organization …

A hybrid framework for data loss prevention and detection

E Costante, D Fauri, S Etalle… - 2016 IEEE security …, 2016 - ieeexplore.ieee.org
Data loss, ie the unauthorized/unwanted disclosure of data, is a major threat for modern
organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ …