Post-Intrusion Recovery Using Data Dependency Approach
暂无分享,去创建一个
[1] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[2] Brajendra Panda,et al. An overview of post information warfare data recovery , 1998, SAC '98.
[3] Leonard J LaPadula. State of the Art in Anomaly Detection and Reaction: An Update , 1999 .
[4] Navdeep Singh,et al. A Survey of Intrusion Detection Techniques , 2013 .
[5] Sushil Jajodia,et al. Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.
[6] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Sushil Jajodia,et al. Trusted recovery , 1999, CACM.
[8] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[9] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[10] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .