Mostrando 2 resultados de: 2
Filtros aplicados
Subtipo de publicación
Conference Object(2)
Publisher
Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012(1)
Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012(1)
Combining digital forensic practices and database analysis as an anti-money laundering strategy for financial institutions
Conference ObjectAbstract: Digital forensics is the science that identify, preserve, collect, validate, analyse, interpret, andPalabras claves:BI, Business intelligence, database log, digital forensics, ETL, extractor, FTK, MySQL, SAP, store procedureAutores:Angelopoulou O., Denys A. Flores, Self R.J.Fuentes:googlescopusCONDOR: A hybrid IDS to offer improved intrusion detection
Conference ObjectAbstract: Intrusion Detection Systems are an accepted and very useful option to monitor, and detect maliciousPalabras claves:Anomaly, false negative, false positive, hybrid, Ids, intrusion detection, NIDS, SignatureAutores:Day D.J., Denys A. Flores, Lallie H.S.Fuentes:googlescopus