Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Conference Object(4)
Publisher
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017(1)
Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019(1)
Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012(1)
Proceedings of the 2021 5th World Conference on Smart Trends in Systems Security and Sustainability, WorldS4 2021(1)
Combining digital forensic practices and database analysis as an anti-money laundering strategy for financial institutions
Conference ObjectAbstract: Digital forensics is the science that identify, preserve, collect, validate, analyse, interpret, andPalabras claves:BI, Business intelligence, database log, digital forensics, ETL, extractor, FTK, MySQL, SAP, store procedureAutores:Angelopoulou O., Denys A. Flores, Self R.J.Fuentes:googlescopusEvaluating social and ecological sustainability initiatives in global companies using text analysis techniques
Conference ObjectAbstract: Although several agencies in charge of promoting the adoption of a Sustainable Development have poinPalabras claves:Lda, Monte Carlo, Sustainable Development, TBL, text analysisAutores:Carlos Montenegro, Denys A. Flores, Edison Loza-Aguirre, Galo MoretaFuentes:scopusHybrid logical clocks for database forensics: Filling the gap between chain of custody and database auditing
Conference ObjectAbstract: Database audit records are important for investigating suspicious actions against transactional dataPalabras claves:causality, Chain of custody, Database audit, Database forensics, Database security, Hybrid logical clocks, Provenance, Role segregationAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopusImplementing chain of custody requirements in database audit records for forensic purposes
Conference ObjectAbstract: During forensic database investigations, audit records become a crucial evidential element; particulPalabras claves:Admissibility, Architecture, Audit, causality, Chain of custody, Database forensics, Proactive, Provenance, Role segregation, Stored procedure, Timeline, Trigger, Vector clockAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopus