.

Information Warfare

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi A.
dc.contributor.author Kaddoura, Sanaa
dc.contributor.author Zekri, Ahmed
dc.date.accessioned 2018-02-22T11:28:04Z
dc.date.available 2018-02-22T11:28:04Z
dc.date.copyright 2015 en_US
dc.date.issued 2018-02-22
dc.identifier.isbn 9781479975600 en_US
dc.identifier.uri http://hdl.handle.net/10725/7117
dc.description.abstract Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning the entire log from the point of attack to the end which is a slow procedure. In this paper, we present an efficient damage assessment and recovery algorithm to recover the database from malicious transactions. The algorithm is based on data dependency and uses a single matrix that will be later used during recovery. en_US
dc.description.sponsorship IEEE en_US
dc.description.sponsorship IEEE Computational Intelligence Society en_US
dc.description.sponsorship IEEE Big Data en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computational intelligence -- Congresses en_US
dc.title Information Warfare en_US
dc.type Conference Paper / Proceeding en_US
dc.title.subtitle Fighting Back Efficiently Through the Matrix en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.publication.place Los Alamitos, Calif. en_US
dc.keywords Databases en_US
dc.keywords Algorithm design and analysis en_US
dc.keywords Intrusion detection en_US
dc.keywords Clustering algorithms en_US
dc.keywords Sparse matrices en_US
dc.keywords Computer science en_US
dc.description.bibliographiccitations Includes bibliographical references. en_US
dc.identifier.doi http://dx.doi.org/10.1109/SSCI.2015.73 en_US
dc.identifier.ctation Haraty, R. A., Kaddoura, S., & Zekri, A. (2015, December). Information warfare: Fighting back through the matrix. In Computational Intelligence, 2015 IEEE Symposium Series on (pp. 449-454). IEEE. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.conference.date 8-10 December 2015 en_US
dc.conference.pages 449-454 en_US
dc.conference.place Cape Town, South Africa en_US
dc.conference.subtitle 2015 IEEE Symposium Series on Computational Intelligence : proceedings en_US
dc.conference.title SSCI 2015 en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://ieeexplore.ieee.org/abstract/document/7376646/ en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627 en_US
dc.publication.date 2015 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account