An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems
暂无分享,去创建一个
[1] Kamalrulnizam Abu Bakar,et al. Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[2] Mohd Fadzil Hassan,et al. Data hibernation framework in workflows under intrusion threat , 2011, 2011 IEEE Symposium on Computers & Informatics.
[3] Ayman Mohamed Mostafa,et al. Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases , 2013 .
[4] Wang Huijie. A Security Framework for Database Auditing System , 2017, 2017 10th International Symposium on Computational Intelligence and Design (ISCID).
[5] Sugata Sanyal,et al. Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[6] A.R. Hamdan,et al. Classifying heterogeneous data with Artificial Immune System , 2008, 2008 International Symposium on Information Technology.
[7] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[8] Ayman Mohamed Mostafa,et al. Design and implementation of multi-layer policies for database security , 2013 .
[9] Gerome Miklau,et al. Auditing a Database under Retention Restrictions , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[10] Zhilei Cui,et al. Adaptive Intrusion Tolerance Strategy of the System Based on Artificial Immune , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[11] Chung-Ming Ou,et al. Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.
[12] Azmi Jaafar,et al. Immune Systems Approaches for Cryptographic Algorithm , 2011, 2011 Sixth International Conference on Bio-Inspired Computing: Theories and Applications.
[13] Mário M. Freire,et al. Applications of artificial immune systems to computer security: A survey , 2017, J. Inf. Secur. Appl..
[14] Kehe Wu,et al. The design and implementation of database audit system framework , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.
[15] Qiang Huang,et al. A Logging Scheme for Database Audit , 2009, 2009 Second International Workshop on Computer Science and Engineering.
[16] Asim A. Elshiekh,et al. Three Audit Stages for Securing Statistical Databases , 2009, 2009 International Conference on Information Management and Engineering.
[18] Ayman Mohamed Mostafa,et al. Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).
[19] Han Dong,et al. A novel generalized framework for access control based on the immune mechanism , 2008, 2008 7th World Congress on Intelligent Control and Automation.
[20] Gang Chen,et al. An Immunity-Based Intrusion Detection Solution for Database Systems , 2005, WAIM.
[21] Yunpeng Li,et al. An Audit Method Based on Mathematical Statistics Detection in Database Audit System , 2015 .