Extended data dependency approach: a robust way of rebuilding database
暂无分享,去创建一个
[1] Brajendra Panda,et al. Data dependency based logging for defensive information warfare , 2000, SAC '00.
[2] Sushil Jajodia,et al. Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.
[3] Brajendra Panda,et al. Reorganization of Database Log for Information Warfare Data Recovery , 2001, DBSec.
[4] John P. McDermott,et al. Storage Jamming , 1995, DBSec.
[5] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[6] David S Alberts,et al. Defensive Information Warfare , 1996 .
[7] Teresa F. Lunt,et al. Knowledge-based intrusion detection , 1989, [1989] Proceedings. The Annual AI Systems in Government Conference.
[8] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.