Architecture of software system for corporate and technological control software users' behavior analysis; Mechanical Engineering, Automation and Control Systems (MEACS)

Detaylı Bibliyografya
Parent link:Mechanical Engineering, Automation and Control Systems (MEACS).— 2014.— [5 p.]
Yazar: Banokin P. I. Pavel Ivanovich
Müşterek Yazar: Национальный исследовательский Томский политехнический университет (ТПУ) Институт кибернетики (ИК) Кафедра автоматики и компьютерных систем (АИКС)
Diğer Yazarlar: Tsapko G. P. Gennady Pavlovich
Özet:Title screen
This paper proposes architecture of a software system for users' behavior analysis. Sources of behavior data could be technological control software (SCADA client applications) and corporate software. Author presents a data leaks detection process that consists of two stages. The first is related to rule based detection while the latter relies on user profiles comparison. User profile operations and characteristics are described.
Режим доступа: по договору с организацией-держателем ресурса
Dil:İngilizce
Baskı/Yayın Bilgisi: 2014
Konular:
Online Erişim:http://dx.doi.org/10.1109/MEACS.2014.6986920
Materyal Türü: Elektronik Kitap Bölümü
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=639065

MARC

LEADER 00000nla2a2200000 4500
001 639065
005 20231101134038.0
035 |a (RuTPU)RU\TPU\network\3463 
035 |a RU\TPU\network\3462 
090 |a 639065 
100 |a 20150219a2014 k y0engy50 ba 
101 0 |a eng 
105 |a a z 101zy 
135 |a drcn ---uucaa 
181 0 |a i  
182 0 |a b 
200 1 |a Architecture of software system for corporate and technological control software users' behavior analysis  |f P. I. Banokin, G. P. Tsapko 
203 |a Text  |c electronic 
300 |a Title screen 
320 |a [References: 5 tit.] 
330 |a This paper proposes architecture of a software system for users' behavior analysis. Sources of behavior data could be technological control software (SCADA client applications) and corporate software. Author presents a data leaks detection process that consists of two stages. The first is related to rule based detection while the latter relies on user profiles comparison. User profile operations and characteristics are described. 
333 |a Режим доступа: по договору с организацией-держателем ресурса 
463 0 |0 (RuTPU)RU\TPU\network\3200  |t Mechanical Engineering, Automation and Control Systems (MEACS)  |o proceedings of the International Conference, Tomsk, 16-18 October, 2014  |f National Research Tomsk Polytechnic University (TPU) ; Institute of Electrical and Electronics Engineers (IEEE)  |v [5 p.]  |d 2014 
610 1 |a электронный ресурс 
610 1 |a труды учёных ТПУ 
610 1 |a behavior profile 
610 1 |a data leaks prevention 
610 1 |a profiles comparison 
610 1 |a user behavior 
610 1 |a утечка 
610 1 |a данные 
610 1 |a профили 
610 1 |a сравнения 
610 1 |a пользователи 
610 1 |a программное обеспечение 
700 1 |a Banokin  |b P. I.  |c specialist in the field of automatic control  |c Assistant of Tomsk Polytechnic University  |f 1988-  |g Pavel Ivanovich  |2 stltpush  |3 (RuTPU)RU\TPU\pers\31757 
701 1 |a Tsapko  |b G. P.  |c Specialist in the field of Automation and Computer Systems  |c Associate Professor of Tomsk Polytechnic University, Candidate of Technical Sciences  |f 1949-  |g Gennady Pavlovich  |2 stltpush  |3 (RuTPU)RU\TPU\pers\31672 
712 0 2 |a Национальный исследовательский Томский политехнический университет (ТПУ)  |b Институт кибернетики (ИК)  |b Кафедра автоматики и компьютерных систем (АИКС)  |h 125  |2 stltpush  |3 (RuTPU)RU\TPU\col\18698 
801 2 |a RU  |b 63413507  |c 20161227  |g RCR 
856 4 |u http://dx.doi.org/10.1109/MEACS.2014.6986920 
942 |c CF