UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2
hits: 17
1.
  • IoV-BCFL: An intrusion dete... IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning
    Xie, Nannan; Zhang, Chuanxue; Yuan, Qizhao ... Ad hoc networks, 10/2024, Volume: 163
    Journal Article
    Peer reviewed

    In recent years, Internet of Vehicles (IoV) is in a booming stage. But at the same time, the methods of attack against IoV such as Denial of Service (DoS) and deception are great threats to personal ...
Full text
2.
  • IoT forensics: Exploiting u... IoT forensics: Exploiting unexplored log records from the HIKVISION file system
    Dragonas, Evangelos; Lambrinoudakis, Costas; Kotsis, Michael Journal of forensic sciences, 11/2023, Volume: 68, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    CCTV surveillance systems are IoT products that can be found almost everywhere. Their digital forensic analysis often plays a key role in solving crimes. However, it is common for these devices to ...
Full text
3.
  • IoT forensics: Exploiting l... IoT forensics: Exploiting log records from the DAHUA technology CCTV systems
    Dragonas, Evangelos; Lambrinoudakis, Costas; Kotsis, Michael Journal of forensic sciences, January 2024, 2024-Jan, 2024-01-00, 20240101, Volume: 69, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    CCTV surveillance systems are ubiquitous IoT appliances. Their forensic examination has proven critical for investigating crimes. DAHUA Technology is a well‐known manufacturer of such products. ...
Full text
4.
  • Classifying Database Users ... Classifying Database Users for Intrusion Prediction and Detection in Data Security
    Bakir, Cigdem; Hakkoymaz, Veli Tehnički vjesnik, 12/2020, Volume: 27, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    The fact that users and applications acquire information using web sites on the internet means that document and information sharing, banking and other operational processes are increasing day by ...
Full text

PDF
5.
  • Deployment of a posteriori ... Deployment of a posteriori access control using IHE ATNA
    Azkia, Hanieh; Cuppens-Boulahia, Nora; Cuppens, Frédéric ... International journal of information security, 10/2015, Volume: 14, Issue: 5
    Journal Article
    Peer reviewed

    In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control mechanisms prevent illegal access by ...
Full text
6.
  • Anomaly Detection in Log Re... Anomaly Detection in Log Records
    Ghuli, Poonam Indonesian Journal of Electrical Engineering and Computer Science, 04/2018, Volume: 10, Issue: 1
    Journal Article
    Open access

    Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion ...
Full text

PDF
7.
  • Automating Information Security Policy Compliance Checking
    Mandal, Debashis; Mazumdar, Chandan 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT), 2018-Jan.
    Conference Proceeding

    Information Security Policies are used for expressing the high level objectives of Security of an enterprise. The different IT assets are configured to protect the enterprise from attackers. The ...
Full text
8.
  • Towards Blockchain-Driven Network Log Management System
    Rakib, Mohammad Habibullah; Hossain, Showkot; Jahan, Mosarrat ... 2020 IEEE 8th International Conference on Smart City and Informatization (iSCI), 2020-Dec.
    Conference Proceeding

    Log data is crucial to detect mischievous activities conducted in a computing environment. Traditional log management systems that depend on cloud and centralized storage servers are vulnerable to a ...
Full text
9.
  • A technique to search log r... A technique to search log records using system of linear equations
    Savade, L. C.; Chavan, S. 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 2012-Sept.
    Conference Proceeding

    Growth of network technology and easy internet access are the key features for development and use of Database-as-a-Service (DaaS) technique. In DaaS technique it is necessary to ensure safe and ...
Full text
10.
  • An optimized approach for live VM migration using log records
    Mohan, Anju; Shine, S. 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 07/2013
    Conference Proceeding

    Virtual Machines(VMs) refer to the software implementation of a computer that runs its own operating system and applications as if it is a physical machine. Live migration of VMs allows a server ...
Full text
1 2
hits: 17

Load filters