A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems
暂无分享,去创建一个
[1] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Sin Yeung Lee,et al. Learning Fingerprints for a Database Intrusion Detection System , 2002, ESORICS.
[3] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[4] Elisa Bertino,et al. Responding to Anomalous Database Requests , 2008, Secure Data Management.
[5] Simon N. Foley,et al. Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems , 2016, DBSec.
[6] Elisa Bertino,et al. Data and syntax centric anomaly detection for relational databases , 2016, WIREs Data Mining Knowl. Discov..
[7] Jerry den Hartog,et al. A white-box anomaly-based framework for database leakage detection , 2017, J. Inf. Secur. Appl..
[8] Elisa Bertino,et al. DetAnom: Detecting Anomalous Database Transactions by Insiders , 2015, CODASPY.
[9] Simon N. Foley,et al. Detecting Anomalous Behavior in DBMS Logs , 2016, CRiSIS.
[10] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .