Главная
Study mode:
on
1
Introduction
2
Traditional workload modeling
3
Performance metrics
4
Pocket Data
5
Behavioral Patterns
6
Database Trends
7
Insider Threads
8
Query Monitoring
9
Regularizing Queries
10
Detecting Activity Changes
11
Data Collection
12
Results
13
Questions
Description:
Explore workload modeling techniques for enhancing security and privacy in databases through this 22-minute lecture by Gokhan Kul from UMass Dartmouth. Delve into traditional workload modeling approaches, performance metrics, and the concept of Pocket Data. Examine behavioral patterns and database trends, with a focus on insider threats and query monitoring. Learn about regularizing queries, detecting activity changes, and data collection methods. Gain insights from the presented results and engage with the Q&A session to deepen your understanding of this critical aspect of database management and cybersecurity.

Workload Modeling for Security and Privacy in Databases

CAE in Cybersecurity Community
Add to list
0:00 / 0:00