.

Information warfare recovery-fighting back through the matrix. (c2012)

LAUR Repository

Show simple item record

dc.contributor.author Zbib, Mirna
dc.date.accessioned 2012-09-26T11:07:47Z
dc.date.available 2012-09-26T11:07:47Z
dc.date.copyright 2012 en_US
dc.date.issued 2012-09-26
dc.date.submitted 2012-06-05
dc.identifier.uri http://hdl.handle.net/10725/1255
dc.description Includes bibliographical references (leaves 58-60). en_US
dc.description.abstract With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. In this work we present an efficient damage assessment and recovery algorithm to recover from malicious transactions based on the concept of the matrix. We also compare the various approaches and present the performance results. en_US
dc.language.iso en en_US
dc.subject Information warfare en_US
dc.subject Data recovery (Computer science) en_US
dc.subject Computer networks -- Security measures en_US
dc.title Information warfare recovery-fighting back through the matrix. (c2012) en_US
dc.type Thesis en_US
dc.term.submitted Spring en_US
dc.author.degree MS in Computer Science en_US
dc.author.school Arts and Sciences en_US
dc.author.idnumber 200904220 en_US
dc.author.commembers Dr. Samer Habre,
dc.author.commembers Dr. Azzam Mourad
dc.author.woa OA en_US
dc.description.physdesc 1 bound copy: xiii, 64 leaves; ill.; 30 cm. available at RNL. en_US
dc.author.division Computer Science en_US
dc.author.advisor Dr. Ramzi Haraty
dc.keywords Damage Assessment en_US
dc.keywords Recovery en_US
dc.keywords Malicious Transaction en_US
dc.keywords Transaction Dependency en_US
dc.keywords Data Dependency en_US
dc.identifier.doi https://doi.org/10.26756/th.2012.21 en_US
dc.publisher.institution Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account