Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

Faculty Computer Science Year: 2020
Type of Publication: ZU Hosted Pages: 145332 - 145362
Authors:
Journal: IEEE Access IEEE Volume: 8
Keywords : Towards , Hybrid Immune Algorithm Based , Danger    
Abstract:
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required
   
     
 
       

Author Related Publications

  • Wael Said AbdelMageed Mohamed, "A big data approach to sentiment analysis using greedy feature selection with cat swarm optimization-based long short-term memory neural networks", Springer Nature, 2018 More
  • Wael Said AbdelMageed Mohamed, "Improving the reconstruction of dental occlusion using a reconstructed‑based identical matrix point technique", Springer Nature Switzerland AG, 2021 More
  • Wael Said AbdelMageed Mohamed, "Connection-Adjustable Network Slicing Process for Heterogeneous Service Handling in Real-Time Applications", American Scientific Publishers, 2022 More
  • Wael Said AbdelMageed Mohamed, "Space Division Multiple Access for Cellular V2X Communications", Tech Science Press, 2022 More
  • Wael Said AbdelMageed Mohamed, "A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications", Tech Science Press, 2021 More

Department Related Publications

  • Heba Zaki Mohamed Abdallah Elfiqi, "A computational linguistic approach for the identification of translator stylometry using Arabic-English text", IEEE, 2011 More
  • Heba Zaki Mohamed Abdallah Elfiqi, "Measuring Complexity of Mouse Brain Morphological Changes Using GeoEntropy", AIP Publishing, 2009 More
  • Mohammed Abdel Basset Metwally Attia, "Training Feedforward Neural Networks Using Symbiotic Organisms Search Algorithm", Computational Intelligence and Neuroscience, 2016 More
  • Mohammed Abdel Basset Metwally Attia, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Mustafa Khamis Baz Ramadan, "An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making", An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making, 2017 More
Tweet