Login / Signup
Honeypot based unauthorized data access detection in MapReduce systems.
Huseyin Ulusoy
Murat Kantarcioglu
Bhavani M. Thuraisingham
Latifur Khan
Published in:
ISI (2015)
Keyphrases
</>
data access
data intensive
data management
database access
data transfer
data sharing
computer systems
data objects
reduce network traffic
database
application developers
database applications
data processing
data warehouse
real world
software development
distributed systems
object oriented
knowledge discovery