{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T05:15:25Z","timestamp":1733375725418,"version":"3.30.1"},"reference-count":15,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["KES"],"published-print":{"date-parts":[[2021,11,10]]},"abstract":"Database Management Systems (DBMS) are regularly used to store and process touchy endeavour information. In any case, it is beyond the realm of imagination to expect to verify the information by depending on the entrance control and security instruments of such frameworks alone; clients may handle their benefits or go around security systems to malevolently adjust and get to the information. Hence, we have developed a reliable, secure, and real-time data damage tracking Quarantine and recovery scheme using Customized ANN approach. The proposed DTQR scheme recovers the accurate data from any newer data and eliminates the fraudulent data. The approach also provides a solution for runtime problems occurring in the DBMS. Moreover, the proposed technique implemented in the working platform of JAVA and the results are analyzed with existing techniques to prove the efficiency of the proposed system.<\/jats:p>","DOI":"10.3233\/kes-210075","type":"journal-article","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T17:20:47Z","timestamp":1637083247000},"page":"323-333","source":"Crossref","is-referenced-by-count":0,"title":["CPU runtime optimization in data damage tracking quarantine and recovery (DTQR) scheme based on customized ANN"],"prefix":"10.1177","volume":"25","author":[{"given":"M.","family":"Somasundara Rao","sequence":"first","affiliation":[{"name":"Department of CSE, JNTUK, Kakinada and Vignan\u2019s Institute of Information Technology (A), Andhra Pradesh, India"}]},{"given":"Koduganti","family":"Venkata Rao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Vignan\u2019s Institute of Information Technology (A), Andhra Pradesh, India"}]},{"given":"M.H.M.","family":"Krishna Prasad","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, JNTUK, Kakinada, Andhra Pradesh, India"}]}],"member":"179","reference":[{"issue":"2","key":"10.3233\/KES-210075_ref1","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/s11227-011-0644-y","article-title":"An anomaly-based detection in the ubiquitous network using the equilibrium state of the catastrophe theory","volume":"64","author":"Xiong","year":"2011","journal-title":"Journal Supercomputer"},{"issue":"1","key":"10.3233\/KES-210075_ref2","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10844-013-0266-3","article-title":"Human perspective to anomaly detection for cybersecurity","volume":"42","author":"Chen","year":"2013","journal-title":"Journal Intell Information System"},{"issue":"6","key":"10.3233\/KES-210075_ref3","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/TKDE.2010.151","article-title":"Design and implementation of an intrusion response system for relational databases","volume":"23","author":"Kamra","year":"2011","journal-title":"IEEE Transactions Knowledge and Data Engineering"},{"key":"10.3233\/KES-210075_ref4","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.knosys.2015.10.017","article-title":"On efficient conditioning of probabilistic relational databases","volume":"92","author":"Zhu","year":"2016","journal-title":"Knowledge-Based Systems"},{"issue":"9","key":"10.3233\/KES-210075_ref5","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.1016\/j.engappai.2013.04.010","article-title":"An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique","volume":"26","author":"Shamshirband","year":"2013","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"1","key":"10.3233\/KES-210075_ref6","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","article-title":"A survey of coordinated attacks and collaborative intrusion detection","volume":"29","author":"Zhou","year":"2010","journal-title":"Computers & Security"},{"issue":"4","key":"10.3233\/KES-210075_ref7","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.jvlc.2013.12.002","article-title":"Hierarchical crowd analysis and anomaly detection","volume":"25","author":"Chong","year":"2014","journal-title":"Journal of Visual Languages & Computing"},{"issue":"4","key":"10.3233\/KES-210075_ref8","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1016\/j.cageo.2010.04.015","article-title":"A relational database management system for atmospheric compensation research","volume":"37","author":"Powell","year":"2011","journal-title":"Computers & Geosciences"},{"issue":"3","key":"10.3233\/KES-210075_ref9","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TDSC.2012.11","article-title":"Detecting anomalous insiders in collaborative information systems","volume":"9","author":"Chen","year":"2012","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.3233\/KES-210075_ref10","first-page":"1","article-title":"DBSAFE\u00a0\u2013 an anomaly detection system to protect databases from exfiltration attempts","author":"Sallam","year":"2015","journal-title":"IEEE Systems Journal"},{"key":"10.3233\/KES-210075_ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.011","article-title":"Ensemble-based collaborative and distributed intrusion detection systems: A survey","volume":"66","author":"Folino","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"10.3233\/KES-210075_ref12","doi-asserted-by":"crossref","first-page":"4349","DOI":"10.1016\/j.asoc.2010.12.004","article-title":"Alert correlation in collaborative intelligent intrusion detection systems\u00a0\u2013 A survey","volume":"11","author":"Elshoush","year":"2011","journal-title":"Applied Soft Computing"},{"issue":"6\u20137","key":"10.3233\/KES-210075_ref13","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.cose.2011.05.008","article-title":"Data preprocessing for anomaly-based network intrusion detection: A review","volume":"30","author":"Davis","year":"2011","journal-title":"Computers & Security"},{"issue":"8","key":"10.3233\/KES-210075_ref14","doi-asserted-by":"crossref","first-page":"2134","DOI":"10.1109\/TKDE.2015.2411595","article-title":"Efficient enforcement of action-aware purpose-based access control within relational database management systems","volume":"27","author":"Colombo","year":"2015","journal-title":"IEEE Transaction Knowledge Data Engineering"},{"key":"10.3233\/KES-210075_ref15","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.is.2013.10.002","article-title":"Performance of program modification techniques that ensure serializable executions with snapshot isolation DBMS","volume":"40","author":"Alomari","year":"2014","journal-title":"Information Systems"}],"container-title":["International Journal of Knowledge-based and Intelligent Engineering Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/KES-210075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T07:05:01Z","timestamp":1733295901000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/KES-210075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":15,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/kes-210075","relation":{},"ISSN":["1327-2314","1875-8827"],"issn-type":[{"type":"print","value":"1327-2314"},{"type":"electronic","value":"1875-8827"}],"subject":[],"published":{"date-parts":[[2021,11,10]]}}}