Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection
暂无分享,去创建一个
Sharmila Subudhi | Suvasini Panigrahi | Tanmay Kumar Behera | Sharmila Subudhi | S. Panigrahi | T. Behera
[1] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[2] Taewan Kim,et al. Application of density-based outlier detection to database activity monitoring , 2013, Inf. Syst. Frontiers.
[3] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[4] Brajendra Panda,et al. Predicting and Preventing Insider Threat in Relational Database Systems , 2010, WISTP.
[5] Shamik Sural,et al. Two-stage database intrusion detection by combining multiple evidence and belief update , 2013, Inf. Syst. Frontiers.
[6] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[7] Hans-Peter Kriegel,et al. OPTICS: ordering points to identify the clustering structure , 1999, SIGMOD '99.