Search

Results: 3
Secure and Dynamic Multi-Keyword Ranked Search
Nowadays, information storing in third party storage is increased. Outsourcing the data to other storage device or servers which may questioned to the secure environment. However, sensitive data like medical information should...
Published by: IGI Global
Cyber Threat Hunting
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the...
Published by: IGI Global