Afonso, 2011 - Google Patents
Pattern Mining A Key To Improve Network Usage UnderstandingAfonso, 2011
- Document ID
- 421544625936860277
- Author
- Afonso N
- Publication year
External Links
- 230000006399 behavior 0 abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230080471A1 (en) | Endpoint agent and system | |
Yen et al. | Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks | |
Zhang et al. | Causality reasoning about network events for detecting stealthy malware activities | |
Zhang et al. | A survey on latest botnet attack and defense | |
US20230095415A1 (en) | Helper agent and system | |
US8561187B1 (en) | System and method for prosecuting dangerous IP addresses on the internet | |
Kondracki et al. | Catching transparent phish: Analyzing and detecting mitm phishing toolkits | |
AU2019203412A1 (en) | Cybersecurity system | |
Collins et al. | Network security through data analysis: building situational awareness | |
US20060218640A1 (en) | System, Method and Computer Readable Medium for Evaluating a Security Characteristic | |
US11985147B2 (en) | System and method for detecting a cyberattack | |
Collins | Network security through data analysis: From data to action | |
Uhříček et al. | BOTA: Explainable IoT malware detection in large networks | |
Kondracki et al. | The droid is in the details: Environment-aware evasion of android sandboxes | |
Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
Tundis et al. | An exploratory analysis on the impact of Shodan scanning tool on the network attacks | |
Bryant | Hacking SIEMs to Catch Hackers: Decreasing the Mean Time to Respond to Network Security Events with a Novel Threat Ontology in SIEM Software | |
US12149422B2 (en) | Query prints (Qprints): telemetry-based similarity for DNS | |
Farasat et al. | Detecting and analyzing border gateway protocol blackholing activity | |
Liao et al. | A comprehensive study of dns operational issues by mining dns forums | |
US11632393B2 (en) | Detecting and mitigating malware by evaluating HTTP errors | |
Ramaki et al. | Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks | |
Afonso | Pattern Mining A Key To Improve Network Usage Understanding | |
Skopik et al. | Intrusion detection in distributed systems using fingerprinting and massive event correlation | |
Dodopoulos | DNS-based Detection of Malicious Activity |