Bayesian Methods Applied to the Database Inference Problem
暂无分享,去创建一个
[1] M. E. Maron,et al. On Relevance, Probabilistic Indexing and Information Retrieval , 1960, JACM.
[2] D. Madigan,et al. Model Selection and Accounting for Model Uncertainty in Graphical Models Using Occam's Window , 1994 .
[3] Gregory F. Cooper,et al. A Bayesian method for the induction of probabilistic networks from data , 1992, Machine Learning.
[4] Harry S. Delugach,et al. Using Conceptual Graphs to Represent Database Inference Security Analysis , 1994 .
[5] Kan Zhang. IRI: A Quantitative Approach to Inference Analysis in Relational Databases , 1997, DBSec.
[6] W. Buszkowski,et al. On the logic of database dependencies , 1986 .
[7] David Heckerman,et al. Bayesian Networks for Knowledge Discovery , 1996, Advances in Knowledge Discovery and Data Mining.
[8] Norman S. Matloff,et al. Inference Control Via Query Restriction Vs. Data Modification: A Perspective , 1988, DBSec.
[9] Harry S. Delugach,et al. Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..
[10] D.G. Marks,et al. Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[11] Matthew Morgenstern,et al. Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[12] Randall P. Wolf,et al. A Framework for Inference-Directed Data Mining , 1996, DBSec.
[13] Eric Horvitz,et al. Structure and chance: melding logic and probability for software debugging , 1995, CACM.
[14] Wray L. Buntine. Operations for Learning with Graphical Models , 1994, J. Artif. Intell. Res..
[15] Sujeet Shenoi,et al. Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[16] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[17] Jun S. Liu,et al. Sequential Imputations and Bayesian Missing Data Problems , 1994 .
[18] Oliver Costich,et al. A classical automata approach to noninterference type problems , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[19] David J. Spiegelhalter,et al. Sequential updating of conditional probabilities on directed graphical structures , 1990, Networks.
[20] J. Berger. Statistical Decision Theory and Bayesian Analysis , 1988 .
[21] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[22] Tsau Young Lin,et al. Security and Data Mining , 1995, DBSec.
[23] Ira S. Moskowitz,et al. Parsimonious downgrading and decision trees applied to the inference problem , 1998, NSPW '98.
[24] John R. Anderson. The Adaptive Character of Thought , 1990 .
[25] Randall P. Wolf,et al. Protecting databases from inference attacks , 1997, Comput. Secur..