Anomaly Detection in Role Administered Relational Databases — A Novel Method
暂无分享,去创建一个
[1] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[2] Kandasamy Muniasamy,et al. Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm , 2015 .
[3] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[4] Archana Nair,et al. Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications? , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[5] Yao Yuan,et al. Study of database intrusion detection based on improved association rule algorithm , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[6] Elisa Bertino,et al. Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.
[7] K. R. Kavitha,et al. Applying improved svm classifier for leukemia cancer classification using FCBF , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[8] N. Radhika,et al. A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).
[9] Xiaohua Li,et al. An Immune Based Relational Database Intrusion Detection Algorithm , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.
[10] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[11] Dhiren R. Patel,et al. Machine learning proposed approach for detecting database intrusions in RBAC enabled databases , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[12] Saad M. Darwish,et al. Machine learning approach to detect intruders in database based on hexplet data structure , 2016 .
[13] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[14] Saad M. Darwish,et al. Intrusion detection in role administrated database: Transaction-based approach , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).
[15] R. Remya,et al. A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[16] Pranita Jain,et al. A different approach of intrusion detection and Response System for Relational Databases , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).
[17] Murat Kantarcioglu,et al. A Dynamic Approach to Detect Anomalous Queries on Relational Databases , 2015, CODASPY.
[18] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.