Securing Information Against Manipulation in the Production Systems Engineering Process
暂无分享,去创建一个
[1] Edgar R. Weippl,et al. Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding , 2015, IFIP Int. Conf. Digital Forensics.
[2] Leyla Bilge,et al. Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat , 2012, RAID.
[3] Richard J. Enbody,et al. Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.
[4] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[5] Simson L. Garfinkel,et al. Automating Disk Forensic Processing with SleuthKit, XML and Python , 2009, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering.
[6] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[7] Heloise Pieterse,et al. Data Hiding Techniques for Database Environments , 2012, IFIP Int. Conf. Digital Forensics.
[8] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[9] Edgar R. Weippl,et al. A tamper-proof audit and control system for the doctor in the loop , 2016, Brain Informatics.
[10] Andreas Reuter,et al. Principles of transaction-oriented database recovery , 1983, CSUR.
[11] Edgar R. Weippl,et al. Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations , 2014, Digit. Investig..
[12] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[13] David W. Chadwick,et al. Guest editorial: A brief overview of data leakage and insider threats , 2013, Inf. Syst. Frontiers.
[14] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[15] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[16] Andreas Holzinger,et al. Interactive machine learning: experimental evidence for the human in the algorithmic loop , 2018, Applied Intelligence.
[17] Edgar R. Weippl,et al. InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[18] Andreas Holzinger,et al. Interactive machine learning for health informatics: when do we need the human-in-the-loop? , 2016, Brain Informatics.
[19] Beng Chin Ooi,et al. Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).
[20] Edgar R. Weippl,et al. Witnesses for the Doctor in the Loop , 2015, BIH.
[21] N. Memon,et al. The evolution of file carving , 2009, IEEE Signal Processing Magazine.
[22] Camelia-Mihaela Pintea,et al. Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach , 2016, CD-ARES.
[23] Edgar R. Weippl,et al. Using the structure of B+-trees for enhancing logging mechanisms of databases , 2013, Int. J. Web Inf. Syst..
[24] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[25] Ton de Waal,et al. Statistical Disclosure Control in Practice , 1996 .
[26] Andreas Holzinger,et al. Interactive knowledge discovery with the doctor-in-the-loop: a practical example of cerebral aneurysms research , 2016, Brain Informatics.
[27] Noboru Sonehara,et al. Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[28] Edgar R. Weippl,et al. InnoDB Database Forensics , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[29] Jean-Pierre Corriveau,et al. A globally optimal k-anonymity method for the de-identification of health data. , 2009, Journal of the American Medical Informatics Association : JAMIA.