A framework for database intrusion detection system
暂无分享,去创建一个
[1] Marco Vieira,et al. Integrated Intrusion Detection in Databases , 2007, LADC.
[2] Jiadong Ren,et al. An Approach for Database Intrusion Detection Based on the Event Sequence Clustering , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[3] David Thompson,et al. 1997 Computer Crime and Security Survey , 1998, Inf. Manag. Comput. Secur..
[4] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[5] G. B. Jethava,et al. Database intrusion detection by transaction signature , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[6] Yi Hu,et al. An effective log mining approach for database intrusion detection , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.
[7] Elisa Bertino,et al. Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[8] Vijayalakshmi Atluri,et al. The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.
[9] Nikhil Kumar Singh,et al. Enhancing detection rate in database intrusion detection system , 2014, 2014 Science and Information Conference.
[10] Jorge Bernardino,et al. Approaches and Challenges in Database Intrusion Detection , 2014, SGMD.