The Most Addictive Python and SQL Courses
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore workload modeling techniques for enhancing security and privacy in databases through this 22-minute lecture by Gokhan Kul from UMass Dartmouth. Delve into traditional workload modeling approaches, performance metrics, and the concept of Pocket Data. Examine behavioral patterns and database trends, with a focus on insider threats and query monitoring. Learn about regularizing queries, detecting activity changes, and data collection methods. Gain insights from the presented results and engage with the Q&A session to deepen your understanding of this critical aspect of database management and cybersecurity.
Syllabus
Introduction
Traditional workload modeling
Performance metrics
Pocket Data
Behavioral Patterns
Database Trends
Insider Threads
Query Monitoring
Regularizing Queries
Detecting Activity Changes
Data Collection
Results
Questions
Taught by
CAE in Cybersecurity Community