Panel on Intrusion Detection
暂无分享,去创建一个
We try, in this panel, to give an overview of intrusion detection, and then propose some areas where work in database security and intrusion detection can and should overlap.
[1] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[2] P. Kirschenmann. Cybernetics and Information , 1970 .
[3] Michael Gertz,et al. Misuse Detection in Database Systems Through User Profiling , 1999, Recent Advances in Intrusion Detection.