Monitoring cumulated Anomaly in Databases
暂无分享,去创建一个
[1] Marina Moscarini,et al. Auditing sum-queries to make a statistical database secure , 2006, TSEC.
[2] Doo Heon Song,et al. Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System , 2006, J. Inf. Sci. Eng..
[3] Arputharaj Kannan,et al. A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system , 2006, Soft Comput..
[4] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[5] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[6] Xiaoning Zhang,et al. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods , 2001, Decis. Sci..
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[8] Man Hon Wong,et al. Mining fuzzy association rules in databases , 1998, SGMD.
[9] Ying Wang,et al. The Design and Implementation of a Self-Healing Database System , 2004, Journal of Intelligent Information Systems.