Author:
Ramasubramanian P.,Kannan A.
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Chung, C.Y., Gertz, M., Levitt, K.: Misuse detection in database systems through user profiling. In: Web Proceedings of the 2nd InternationalWorkshop on the Recent Advances in Intrusion Detection(RAID), p. 278 (1999)
2. Pikoulas, J., Buchanan, W.J., Manion, M., Triantafyllopoulos, K.: An intelligent agent intrusion system. In: Proceedings of the 9th IEEE International Conference and Workshop on the Engineering of Computer Based Systems - ECBS, pp. 94–102. IEEE Comput. Soc., Luden (2002)
3. Lecture Notes in Artificial Intelligence;P. Ramasubramanian,2004
4. Lecture Notes in Computer Science;P. Ramasubramanian,2004
5. Ramasubramanian, P., Kannan, A.: An Active Rule Based Approach to Database Security in E-Commerce Systems using Temporal Constraints. In: Proceedings of IEEE Tencon 2003, Bangalore, India, October 14-17, pp. 1148–1152 (2003)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献