Quantcast
Channel: CPS-VO - database management systems
Browsing all 39 articles
Browse latest View live

A unified model for cherishing privacy in database system an approach to...

Myalapalli, V.K., Chakravarthy, A.S.N..  2014.  A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities. Networks Soft Computing (ICNSC), 2014 First...

View Article



A unified model for cherishing privacy in database system an approach to...

Myalapalli, V.K., Chakravarthy, A.S.N..  2014.  A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities. Networks Soft Computing (ICNSC), 2014 First...

View Article

A unified model for cherishing privacy in database system an approach to...

Myalapalli, V.K., Chakravarthy, A.S.N..  2014.  A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities. Networks Soft Computing (ICNSC), 2014 First...

View Article

Towards adapting metamodelling technique for database forensics investigation...

Rashad Al-Dhaqm, A.M., Othman, S.H., Abd Razak, S., Ngadi, A..  2014.  Towards adapting metamodelling technique for database forensics investigation domain. Biometrics and Security Technologies...

View Article

Terms Mining in Document-Based NoSQL: Response to Unstructured Data

Lomotey, R.K., Deters, R..  2014.  Terms Mining in Document-Based NoSQL: Response to Unstructured Data. Big Data (BigData Congress), 2014 IEEE International Congress on. :661-668.

View Article


Operating system security by integrity checking and recovery using...

Kaczmarek, J., Wrobel, M.R..  2014.  Operating system security by integrity checking and recovery using write-protected storage. Information Security, IET. 8:122-131.

View Article

DDOS Attack Detection System Based on Analysis of Users' Behaviors for...

Meng, B., Andi, W., Jian, X., Fucai, Z..  2017.  DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. 2017 IEEE International Conference on Computational Science...

View Article

Fully homomorphic encryption schemes: The state of the art

Kogos, K. G., Filippova, K. S., Epishkina, A. V..  2017.  Fully homomorphic encryption schemes: The state of the art. 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic...

View Article


A hybrid method for detection and prevention of SQL injection attacks

Ghafarian, A..  2017.  A hybrid method for detection and prevention of SQL injection attacks. 2017 Computing Conference. :833–838.

View Article


Multi-level Anomaly Detection in Industrial Control Systems via Package...

Feng, C., Li, T., Chana, D..  2017.  Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. 2017 47th Annual IEEE/IFIP International Conference on...

View Article

Ideal complexity cryptosystem with high privacy data service for cloud databases

Gaikwad, V. S., Gandle, K. S..  2017.  Ideal complexity cryptosystem with high privacy data service for cloud databases. 2017 1st International Conference on Intelligent Systems and Information...

View Article

Crawling and cluster hidden web using crawler framework and fuzzy-KNN

Rahayuda, I. G. S., Santiari, N. P. L..  2017.  Crawling and cluster hidden web using crawler framework and fuzzy-KNN. 2017 5th International Conference on Cyber and IT Service Management (CITSM). :1–7.

View Article

A Framework for Insider Collusion Threat Prediction and Mitigation in...

Yaseen, Q., Alabdulrazzaq, A., Albalas, F..  2019.  A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases. 2019 IEEE 9th Annual Computing and Communication Workshop...

View Article


VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining...

Liu, D., Li, Y., Tang, Y., Wang, B., Xie, W..  2018.  VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS. 2018 17th...

View Article

Establishing Independent Audit Mechanisms for Database Management Systems

Rasin, A., Wagner, J., Heart, K., Grier, J..  2018.  Establishing Independent Audit Mechanisms for Database Management Systems. 2018 IEEE International Symposium on Technologies for Homeland Security...

View Article


Fine-Grained Provenance for Matching ETL

Zheng, N., Alawini, A., Ives, Z. G..  2019.  Fine-Grained Provenance for Matching ETL. 2019 IEEE 35th International Conference on Data Engineering (ICDE). :184–195.

View Article

Implementation of Searchable Encryption System with Dedicated Hardware and...

Yoshikawa, M., Ikezaki, Y., Nozaki, Y..  2018.  Implementation of Searchable Encryption System with Dedicated Hardware and Its Evaluation. 2018 9th IEEE Annual Ubiquitous Computing, Electronics Mobile...

View Article


Anomaly Detection in Role Administered Relational Databases — A Novel Method

Ramachandran, Raji, Nidhin, R, Shogil, P P.  2018.  Anomaly Detection in Role Administered Relational Databases — A Novel Method. 2018 International Conference on Advances in Computing, Communications...

View Article

SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query...

Rady, Mai, Abdelkader, Tamer, Ismail, Rasha.  2018.  SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases. 2018 14th International Computer Engineering...

View Article

ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database

Wu, Songrui, Li, Qi, Li, Guoliang, Yuan, Dong, Yuan, Xingliang, Wang, Cong.  2019.  ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. 2019 IEEE 35th International...

View Article
Browsing all 39 articles
Browse latest View live




Latest Images