[go: up one dir, main page]

Afonso, 2011 - Google Patents

Pattern Mining A Key To Improve Network Usage Understanding

Afonso, 2011

Document ID
421544625936860277
Author
Afonso N
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0631Resource planning, allocation or scheduling for a business operation

Similar Documents

Publication Publication Date Title
US20230080471A1 (en) Endpoint agent and system
Yen et al. Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
Zhang et al. Causality reasoning about network events for detecting stealthy malware activities
Zhang et al. A survey on latest botnet attack and defense
US20230095415A1 (en) Helper agent and system
US8561187B1 (en) System and method for prosecuting dangerous IP addresses on the internet
Kondracki et al. Catching transparent phish: Analyzing and detecting mitm phishing toolkits
AU2019203412A1 (en) Cybersecurity system
Collins et al. Network security through data analysis: building situational awareness
US20060218640A1 (en) System, Method and Computer Readable Medium for Evaluating a Security Characteristic
US11985147B2 (en) System and method for detecting a cyberattack
Collins Network security through data analysis: From data to action
Uhříček et al. BOTA: Explainable IoT malware detection in large networks
Kondracki et al. The droid is in the details: Environment-aware evasion of android sandboxes
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Tundis et al. An exploratory analysis on the impact of Shodan scanning tool on the network attacks
Bryant Hacking SIEMs to Catch Hackers: Decreasing the Mean Time to Respond to Network Security Events with a Novel Threat Ontology in SIEM Software
US12149422B2 (en) Query prints (Qprints): telemetry-based similarity for DNS
Farasat et al. Detecting and analyzing border gateway protocol blackholing activity
Liao et al. A comprehensive study of dns operational issues by mining dns forums
US11632393B2 (en) Detecting and mitigating malware by evaluating HTTP errors
Ramaki et al. Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks
Afonso Pattern Mining A Key To Improve Network Usage Understanding
Skopik et al. Intrusion detection in distributed systems using fingerprinting and massive event correlation
Dodopoulos DNS-based Detection of Malicious Activity