2021
DOI: 10.17485/ijst/v14i8.1833
|View full text |Cite
|
Sign up to set email alerts
|

Disaster recovery and risk management over private networks using data provenance: Cyber security perspective

Abstract: Objectives: To understand of data provenance applications towards cyber security for disaster recovery. To design an attack scenario with appropriate use cases using unified modeling language. To construct and analyze the data collected in the selected private computer network using appropriate graphical representation and comparing variables with null hypothesis. Methods: In the existing methods, presence of provenance data is not available with respect to network attack scenarios of risk management. Informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 18 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?