1. Vieira, M., Madeira, H.: Detection of malicious transactions in DBMS. In: 11th Pacific Rim International Symposium on Dependable Computing [S.l.]. IEEE (2005)
2. Newman, A., Berenbaum, E.: System for protecting database applications from unauthorized activity. U.S. Patent Application. 10/798,079, 11 March 2004
3. Surhone, L.M., Tennoe, M.T., Henssonow, S.F., Breiman, L.: Random forest. Mach. Learn. 45(1), 5–32 (2010)
4. King, M.A., Abrahams, A.S., Ragsdale, C.T.: Ensemble methods for advanced skier days prediction. Expert Syst. Appl. 41(4), 1176–1188 (2014)
5. Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)