The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Databases that contain critical information become prime targets for attacks. E-Government sites often contain data that must remain available to its users with as little interruption as possible. In case an intrusion into such a system is detected, quick damage assessment and recovery of data is vital for maintaining system functionality. Conventional log based damage assessment methods require that...
Small and medium-sized enterprises (SMEs) are the important driving forces for the growth of China's economy. However, financing difficulty has always been the important problem besetting the development of SMEs for a long time. In this paper, based on micro-data from 2007 China Industrial Enterprise Database, Propensity Score Matching (PSM) method is adopted to conduct empirical analysis of indirect...
Organizations spend a significant amount of resources securing their servers and network perimeters. However, these mechanisms are not sufficient for protecting databases. In this paper, we present a new technique for identifying malicious database transactions. Compared to many existing approaches which profile SQL query structures and database user activities to detect intrusions, the novelty of...
Existing database misuse detection systems are not well equipped to identify malicious activities carried out by legitimate users of the system. In this paper we present a model that can prevent malicious insider activities at the database application level. Our model is based on user tasks, each of which maps to several transactions. An implementation-oriented approach is described to validate these...
In Modern Chinese Standard dictionary, adjectival modification is represented as a set of synonyms or antonyms which are tagged by attributes. Through a method based on rough pattern, we can extract automatically these widely-accepted attributes from its machine readable dictionary. This work provides a new method to construct a common attribute database for NLP in Chinese.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.