User Behavior Anomaly Detection via System Usage and Active Process Patterns
碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === Cloud computing is a hot topic in the global IT industry, which is considered as the main part of the network and computing service providers in recent years. Some security issues will be more threatening in cloud computing, such as account theft and insider thr...
Main Authors: | Yi-Hsiang Yang, 楊逸翔 |
---|---|
Other Authors: | Yuh-Jye Lee |
Format: | Others |
Language: | en_US |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/ry9jw7 |
Similar Items
-
Modeling Mobile User Behavior for Anomaly Detection
by: Buthpitiya, Senaka
Published: (2014) -
An Anomaly Detection System of User Behavior based on Windows Registry
by: Guan-Yi Li, et al.
Published: (2006) -
Anomaly Detection Localization via Foreground Motion Information
by: Yi-Chen Wang, et al.
Published: (2012) -
The Design of User-based Behavior Miner and Anomaly Detection Mechanism
by: Wei-Cheng Lin, et al.
Published: (2008) -
User and Entity Behavior Anomaly Detection using Network Traffic
by: Carlsson, Oskar, et al.
Published: (2017)