暂无分享,去创建一个
[1] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[2] Peter Radford,et al. Petri Net Theory and the Modeling of Systems , 1982 .
[3] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.
[4] Michael Gertz,et al. DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.
[5] Konstantinos Kemalis,et al. SQL-IDS: a specification-based approach for SQL-injection detection , 2008, SAC '08.
[6] Peng Liu. Architectures for intrusion tolerant database systems , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[7] Deborah A. Frincke,et al. Planning, Petri Nets, and Intrusion Detection , 1998 .
[8] Shiuh-Pyng Shieh,et al. On a Pattern-Oriented Model for Intrusion Detection , 1997, IEEE Trans. Knowl. Data Eng..
[9] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[10] Victor C. S. Lee,et al. Intrusion detection in real-time database systems via time signatures , 2000, Proceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000.
[11] Ehud Gudes,et al. DIWeDa - Detecting Intrusions in Web Databases , 2008, DBSec.
[12] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[13] Yi Hu,et al. Identification of malicious transactions in database systems , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..
[14] Joseph Lee,et al. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions , 2002, ICEIS.
[15] Bruce W. Weide,et al. Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.
[16] Feng Chu,et al. Modeling and performance evaluation of supply chains using batch deterministic and stochastic Petri nets , 2005, IEEE Transactions on Automation Science and Engineering.
[17] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[18] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Muhaimin Dzulfakar. Advanced MySQL Exploitation , 2008 .
[20] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[21] David C. Luckham,et al. Complex Event Processing in Distributed Systems , 1998 .
[22] Alessandro Barenghi,et al. ShieldFS: a self-healing, ransomware-aware filesystem , 2016, ACSAC.
[23] M. Gordeev. Intrusion Detection: Techniques and Approaches , 2003 .
[24] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[25] Alessandro Orso,et al. Preventing SQL injection attacks using AMNESIA , 2006, ICSE.
[27] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[28] Peng Liu. DAIS: a real-time data attack isolation system for commercial database applications , 2001, Seventeenth Annual Computer Security Applications Conference.
[29] Gianluca Stringhini,et al. PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.
[30] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[31] Elisa Bertino,et al. Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[32] Peng Liu,et al. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware , 2017, CCS.
[33] Massimo Ficco,et al. A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing , 2011, 2011 First International Conference on Data Compression, Communications and Processing.
[34] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[35] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[36] Marco Vieira,et al. Detecting Malicious SQL , 2007, TrustBus.
[37] Xia Wang,et al. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems , 2007, Int. J. Inf. Comput. Secur..
[38] Elisa Bertino,et al. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware , 2018, RAID.
[39] Engin Kirda,et al. Redemption: Real-Time Protection Against Ransomware at End-Hosts , 2017, RAID.
[40] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[41] Michael Meier,et al. Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) , 2009, DIMVA.