2018 6th International Symposium on Digital Forensic and Security (ISDFS) 2018
DOI: 10.1109/isdfs.2018.8355376
|View full text |Cite
|
Sign up to set email alerts
|

An anomaly detection approach for enterprise file integration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Ontology-based approaches within the scope of anomalous file integration are presented in Can and Uzum, 2019). In addition, problems that occur within the scope of information security in file integrations are presented in (Uzum and Can, 2018a;Uzum and Can, 2018b). The proposed study is based on the fundamental concepts that are presented in Uzum and Can, 2018a;Uzum and Can, 2018b).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Ontology-based approaches within the scope of anomalous file integration are presented in Can and Uzum, 2019). In addition, problems that occur within the scope of information security in file integrations are presented in (Uzum and Can, 2018a;Uzum and Can, 2018b). The proposed study is based on the fundamental concepts that are presented in Uzum and Can, 2018a;Uzum and Can, 2018b).…”
Section: Related Workmentioning
confidence: 99%
“…The figure shows the process of getting a file from an external system to the internal system and submitting the file to the database. Also, a summary of the general structure is presented in (Uzum and Can, 2018a). As seen in Figure 1, the sender systems could also be specified as the integrators and these systems could be mainly capsulated as external systems.…”
Section: General Structurementioning
confidence: 99%
See 2 more Smart Citations