Detection and prevention of malicious of relational database management systems (RDBMS)
Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. Howeve...
Saved in:
Main Author: | Mohammed Rashad Aldhoqm, Arafat |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Alogrithm to prevent and detect insider multi transaction malicious activity in database
by: Khavidaki, Seyyed Mojtaba Dashti
Published: (2013) -
Algorithm to prevent and detect insider multi transaction malicious activity in database
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013) -
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017) -
SQL Performance : Guideline for Tuning the SQL Queries in Oracle RDBMS
by: Nor'azah, Md. Khushairi
Published: (2005) -
Account verification to prevent malicious users access in web-based forums
by: Tabar, Mahdi Taheri
Published: (2013)