Author:
Lee Chang Seok,Cho Sung Bae
Publisher
Springer International Publishing
Reference13 articles.
1. Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB J. 17(5), 1063–1077 (2008)
2. Srivatava, A., Sural, S., Majumdar, A.K.: Database intrusion detection using sequence mining. J. Comput. 1(4), 8–17 (2006)
3. Rietta, F.S.: Application layer intrusion detection for SQL injection. In: ACM Southeast Regional Conference, pp. 531–536 (2006)
4. Adebowale, A., Idowu, S.A., Oluwabukola, O.: An overview of database centred intrusion detection systems. Int. J. Eng. Adv. Technol. 3(2), 273–275 (2013)
5. Hu, Y., Panda, B.: A data mining approach for database intrusion detection. In: ACM Symposium on Applied Computing, pp. 711–716 (2004)