Skip to main navigation
Skip to search
Skip to main content
University of Portsmouth Home
Help & FAQ
Home
Profiles
Organisations
Research outputs
Student theses
Datasets
Projects
Activities
Prizes
Press/Media
Equipment
Search by expertise, name or affiliation
The use of honey tokens in database security
Penny Ross
School of Computing
Research output
:
Book/Report
›
Book
109
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'The use of honey tokens in database security'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Database Security
100%
Valuable Asset
25%
Intrusion Detection
25%
Insider Threat
25%
Security Breach
25%
Information Security
25%
Authentication
25%
Stored Information
25%
System Resource
25%
Malicious Activity
25%
Virtualizations
25%
Bring Your Own Device
25%
System Administrator
25%
Unauthorized Activity
25%
Global Statistic
25%
Privilege Management
25%
Information System
25%
Firewall
25%
Mobile Device
25%
Data Security
25%
INIS
security
100%
honey
100%
data
25%
information
25%
devices
25%
tools
25%
resources
25%
values
12%
damage
12%
information systems
12%
interactions
12%
management
12%
detection
12%
investment
12%
employees
12%
defense
12%
statistics
12%
assets
12%
clouds
12%
leaks
12%
digital systems
12%
intrusion
12%
authentication
12%