NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
Alomari, Firas – ProQuest LLC, 2013
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
Descriptors: Information Security, Information Systems, Databases, Models
Gulsoy, Gunhan – ProQuest LLC, 2013
New experimental methods has resulted in increasing amount of genetic interaction data to be generated every day. Biological networks are used to store genetic interaction data gathered. Increasing amount of data available requires fast large scale analysis methods. Therefore, we address the problem of querying large biological network datasets.…
Descriptors: Biological Sciences, Biomedicine, Databases, Genetics
Purcell, Bernice M. – ProQuest LLC, 2013
A lack of interoperability impairs data quality among health care providers' electronic health record (EHR) systems. The problem is whether the International Organization for Standardization (ISO) 9000 principles relate to the problem of interoperability in implementation of EHR systems. The purpose of the nonexperimental quantitative research…
Descriptors: Recordkeeping, Databases, Electronic Publishing, Information Management