Abstract:
With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malic...Show MoreMetadata
Abstract:
With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. We also compare the various approaches and present the performance results.
Date of Conference: 04-06 June 2014
Date Added to IEEE Xplore: 21 July 2014
Electronic ISBN:978-1-4799-5350-9
Citations are not available for this document.
Cites in Papers - |
Cites in Papers - IEEE (4)
Select All
1.
Sergio Thoumi, Ramzi A. Haraty, "Damage Assessment and Recovery in Fog-based Computing Systems", 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp.13-18, 2022.
2.
Ramzi A. Haraty, Sanaa Kaddoura, Ahmed Zekri, "Information Warfare: Fighting Back Through the Matrix", 2015 IEEE Symposium Series on Computational Intelligence, pp.449-454, 2015.
3.
Sanaa Kaddoura, "Information matrix: Fighting back using a matrix", 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp.1-6, 2015.
4.
Rasel Mahmud, Ranganath Vallakati, Anupam Mukherjee, Prakash Ranganathan, Arash Nejadpak, "A survey on smart grid metering infrastructures: Threats and solutions", 2015 IEEE International Conference on Electro/Information Technology (EIT), pp.386-391, 2015.
Cites in Papers - Other Publishers (3)
1.
Ramzi A. Haraty, Bahia Boukhari, Sanaa Kaddoura, "An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems", Arabian Journal for Science and Engineering, 2021.
2.
Ramzi A. Haraty, Mohamed El Sai, "Information warfare: a lightweight matrix-based approach for database recovery", Knowledge and Information Systems, 2016.
3.
Sanaa Kaddoura, Ramzi A. Haraty, Ahmed Zekri, Mehedi Masud, "Tracking and Repairing Damaged Healthcare Databases Using the Matrix", International Journal of Distributed Sensor Networks, vol.11, no.11, pp.914305, 2015.