Enhancing Security in Banking Environment Using Business Intelligence
暂无分享,去创建一个
[1] Georgios Loukas,et al. Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..
[2] Priyadarshini Patil,et al. A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .
[3] LoukasGeorgios,et al. Protection Against Denial of Service Attacks , 2010 .
[4] Marlene Goncalves,et al. Supporting Position Change through On-Line Location-Based Skyline Queries , 2016 .
[5] Kristian Beckers,et al. Pattern and Security Requirements , 2015, Springer International Publishing.
[6] Reda Mohamed Hamou,et al. Sonar Data Classification Using a New Algorithm Inspired from Black Holes Phenomenon , 2018, Int. J. Inf. Retr. Res..
[7] Kit Yan Chan,et al. Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions , 2019, AINA Workshops.
[8] Karamjeet Singh,et al. IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .
[9] Tingyuan Nie,et al. Performance Evaluation of DES and Blowfish Algorithms , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.
[10] Masoud Mohammadian. Intelligent Agents for Data Mining and Information Retrieval , 2004 .
[11] Gurvinder Singh,et al. Performance Analysis of Statistical and Supervised Learning Techniques in Stock Data Mining , 2018, Data.
[12] Luiz Fernando Capretz,et al. Security Issues in Data Warehouse , 2015, ArXiv.
[13] Jorge Bernardino,et al. A data masking technique for data warehouses , 2011, IDEAS '11.
[14] J. Efrim Boritz,et al. IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..
[15] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[16] Zahraddeen Abubakar Pindar,et al. A Survey on the Cryptographic Encryption Algorithms , 2017 .
[17] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[18] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[19] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[20] Kit Yan Chan,et al. Twitter mining for ontology-based domain discovery incorporating machine learning , 2018, J. Knowl. Manag..
[21] Shawkat K. Guirguis,et al. A Survey on Cryptography Algorithms , 2018 .
[22] Chantal Soulé-Dupuy,et al. A Textual Warehouse Approach: A Web Data Repository , 2004 .
[23] Anjana Gosain,et al. Security Issues in Data Warehouse: A Systematic Review☆ , 2015 .
[24] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[25] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.