[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Krüger, 2022 - Google Patents

An Approach to Profiler Detection of Cyber Attacks using Case-based Reasoning.

Krüger, 2022

View PDF
Document ID
16085397796369684951
Author
Krüger M
Publication year
Publication venue
LWDA

External Links

Snippet

Cyber attacks not only have an enormous economic damage potential for companies and authorities, but also represent a high risk in the area of critical infrastructures. It is therefore necessary to develop new procedures that enable the profiling of cyber attacks, also with …
Continue reading at ceur-ws.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Arshad et al. Evidence collection and forensics on social networks: Research challenges and directions
Chen et al. Crime data mining: a general framework and some examples
Amato et al. Analyse digital forensic evidences through a semantic-based methodology and NLP techniques
Mohammed et al. An automated approach for digital forensic analysis of heterogeneous big data
CN106650799B (en) A kind of electronic evidence classification extracting method and system
Sivasangari et al. Isolating rumors using sentiment analysis
Bose A comparative study of social networking approaches in identifying the covert nodes
Jones et al. Vanity fair: privacy in querylog bundles
Varol et al. Review of evidence analysis and reporting phases in digital forensics process
Gong et al. Model uncertainty based annotation error fixing for web attack detection
KR20210083510A (en) Crime detection system through fake news decision and web monitoring and Method thereof
Ferrara et al. Context-aware knowledge extraction from legal documents through zero-shot classification
Krüger An Approach to Profiler Detection of Cyber Attacks using Case-based Reasoning.
Schroeder et al. Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis
Karthika et al. Analyzing various social networking approaches for covert networks
Das et al. Realizing digital forensics as a big data challenge
Saha et al. Mobile device and social media forensic analysis: impacts on cyber-crime
Punjabi et al. Forensic Intelligence-Combining Artificial Intelligence with Digital Forensics
Sumalatha et al. Data collection and audit logs of digital forensics in cloud
SalahEldeen et al. Reading the correct history? Modeling temporal intention in resource sharing
Solanke Digital forensics AI: On practicality, optimality, and interpretability of digital evidence mining techniques
Aljarboua et al. Cyber-Crime Detection: Experimental Techniques Comparison Analysis
Karie et al. Taxonomy for digital forensic evidence
Amir et al. Crowdsourcing Cybercrimes through Online Resources
Verma et al. New Approach of Artificial Intelligence in Digital Forensic Investigation: A Literature Review