2011
DOI: 10.1007/978-3-642-22688-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Unix Systems Monitoring with FCA

Abstract: Abstract. There are many existing software tools for identifying specific and severe IT security threats (virus checkers, firewalls). But it is more difficult to detect less severe and more general problems, such as disclosure of sensitive or private data. In theory, security problems could be detected with existing tools, but the amount of information provided is often too overwhelming. FCA is a promising technology in this application area because it helps to reduce and explore data without prescribing what … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…FCA has been used for handling relational structures in the source code and dependency between software parts in several aspects including RBAC (Priss, 2011;Priss et al, 2012;. Role based access control (RBAC) provides the role of a user in the IT systems with specific permissions like read or write.…”
Section: Applications Of Fcamentioning
confidence: 99%
See 1 more Smart Citation
“…FCA has been used for handling relational structures in the source code and dependency between software parts in several aspects including RBAC (Priss, 2011;Priss et al, 2012;. Role based access control (RBAC) provides the role of a user in the IT systems with specific permissions like read or write.…”
Section: Applications Of Fcamentioning
confidence: 99%
“…Other domains discuss the mathematics behind FCA with a fuzzy setting, an interval-valued fuzzy setting, possibility theory, a rough setting, a triadic, factor and incomplete context to apply these extensions in the appropriate context for knowledge processing tasks. Ferjani et al, 2012Feature extractions Formica, 2012 Semantic web Galitsky et al, 2013 Finding patterns on parse thickets Hamrouni et al, 2013 Finding some frequent itemset Li and Guo, 2013 Investigating formal query De Maio et al, 2014 Text mining Muangprathub et al, 2013 Classification Li andTsai, 2013 Text mining Finding cousins Neznanov and Kuznetsov, 2013 FCART tool Poshyvanyk et al, 2012 Concept location Priss, 2006 Application in information sciences Senatore and Pasi, 2013 Finding correlations Li and Tsai, 2013 Opinion classification Zerarga and Djouadi, 2013 Information retrieval Military intelligence Du and Hai, 2013 Mining web page Elzinga et al, 2010 Terrorist threat assessment Poelmans et al, 2013c Criminal trajectories Priss, 2011 Unix system monitoring Romanov et al, 2012 Detect anomalies Web services…”
Section: Ontology Engineering Research Goalmentioning
confidence: 99%