Research Article
A Sensitive File Abnormal Access Detection Method Based on Application Classification
Table 5
Cases of monitoring mechanism availability and security risk analysis.
| Serial number | Monitoring time | Access creation time | Availability | Risk |
| 1 | 23 | 58 | 1 | 0.396552 | 2 | 22 | 18 | 0 | 1.222222 | 3 | 23 | 63 | 1 | 0.365079 | 4 | 21 | 128 | 1 | 0.164063 | 5 | 20 | 46 | 1 | 0.434783 |
|
|