A critical capability required in the operation of cyberspace is the ability to maintain situational awareness of the status of the infrastructure elements that constitute cyberspace. Event logs from cyber devices can yield significant information, and when properly utilized they can provide timely situational awareness about the state of the cyber infrastructure. In addition, proper Information Assurance requires the validation and verification of the integrity of results generated by a commercial log analysis tool. Event log analysis can be performed using relational databases. To enhance database query performance, previous literatures affirm denormalization of databases. Yet database normalization can also increase query performance. Da...
This tutorial deals with applications that help systems and individuals respond to critical condit...
This paper reports the results of an experiment that investigated the effects different structural c...
The teaching of database normalisation has traditionally been centered on the definition of normal f...
Part 5: Short PapersInternational audienceAn important technique for attack detection in complex com...
Subject of Research.The paper presents the results of experimental assessment of relationship force ...
Normalization is a technique in databases to eliminate data redundancy or inconsistent dependency. N...
Ontological data representation and data normalization can provide a structured way to correlate dig...
A normalization database is considered as mathematics logical design to avoid redundancies and incon...
Modern systems record large quantities of electronic data capturing time-ordered events, system stat...
Log event correlation is an effective means of detecting system faults and security breaches encount...
This paper reports the results of an experiment that investigated the effects different structural c...
In 2018, the Colorado Department of Transportation was hit with a ransomware attack that resulted in...
Intrusion Detection has become an inevitable area for commercial applications and academic research....
Recently, non-relational database systems known as NoSQL have emerged as alternative platforms to st...
Abstract: In today’s competitive world that thrives on the thirst for profits through excellence, ob...
This tutorial deals with applications that help systems and individuals respond to critical condit...
This paper reports the results of an experiment that investigated the effects different structural c...
The teaching of database normalisation has traditionally been centered on the definition of normal f...
Part 5: Short PapersInternational audienceAn important technique for attack detection in complex com...
Subject of Research.The paper presents the results of experimental assessment of relationship force ...
Normalization is a technique in databases to eliminate data redundancy or inconsistent dependency. N...
Ontological data representation and data normalization can provide a structured way to correlate dig...
A normalization database is considered as mathematics logical design to avoid redundancies and incon...
Modern systems record large quantities of electronic data capturing time-ordered events, system stat...
Log event correlation is an effective means of detecting system faults and security breaches encount...
This paper reports the results of an experiment that investigated the effects different structural c...
In 2018, the Colorado Department of Transportation was hit with a ransomware attack that resulted in...
Intrusion Detection has become an inevitable area for commercial applications and academic research....
Recently, non-relational database systems known as NoSQL have emerged as alternative platforms to st...
Abstract: In today’s competitive world that thrives on the thirst for profits through excellence, ob...
This tutorial deals with applications that help systems and individuals respond to critical condit...
This paper reports the results of an experiment that investigated the effects different structural c...
The teaching of database normalisation has traditionally been centered on the definition of normal f...