2016
DOI: 10.1016/j.ins.2016.06.038
|View full text |Cite
|
Sign up to set email alerts
|

Anomalous query access detection in RBAC-administered databases with random forest and PCA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 24 publications
0
15
0
Order By: Relevance
“…In late advancements, Ranao et. al [18] introduced a Query Access location approach utilizing Random Forest and PCA to lessen information dimensionality and create just important and unrelated information. As the dimensionality is decreased, both, the framework execution and True Positive rate increments…”
Section: Related Workmentioning
confidence: 99%
“…In late advancements, Ranao et. al [18] introduced a Query Access location approach utilizing Random Forest and PCA to lessen information dimensionality and create just important and unrelated information. As the dimensionality is decreased, both, the framework execution and True Positive rate increments…”
Section: Related Workmentioning
confidence: 99%
“…Genetic algorithm (GA) belongs to a large class of evolutionary algorithms, which is a metaheuristic algorithm inspired by the process of natural selection. Compared with commonly used methods like principal component analysis (PCA) that uses an orthogonal transformation to produce uncorrelated and relevant features [ 32 ], and singular value decomposition (SVD) that factorizes a single matrix into three matrices, GA has an automatic learning process aimed at achieving good feature group selection. It is commonly used to generate high-quality solutions to optimization and search problems by relying on bio-inspired operators, such as mutation, crossover, and selection [ 33 ].…”
Section: Feature Extractionmentioning
confidence: 99%
“…Usually data blocks accessed by the user are not uniformly distributed over the set of data blocks outsourced at the server. The Zipf distribution is often used to model a non-uniform access to a database [42][43][44][45]. The Zipf distribution is also known as the 80:20 or 90:10 law.…”
Section: Path Oram Enhancementmentioning
confidence: 99%
“…The parameter α (α > 0) plays a major role in the Zipf distribution as it determines the shape of the cumulative probability function and regulates the deterioration in requests frequencies [42,[45][46][47][48]. This parameter α can have different values for different applications.…”
Section: Path Oram Enhancementmentioning
confidence: 99%