1. Paul, A., Sushil, J., Peng, L.: Recovery from malicious transactions. IEEE transactions on knowledge and data engineering 14(5), 1167–1185 (2002)
2. Chung, C.Y., Gertz, M., Levitt, K.: Demids: a misuse detection system for database systems. In: Proc. of Third International IFIP TC-11 WG11.5 Working Conference on integrity and Internal Control in Information Systems, pp. 159–178. Kluwer Academic Publishers, Amsterdam (1999)
3. Rakesh, A., Ramakrishnan, S.: Fast algorithms for mining association rules. In: Proc. of 20th International Conference on Very Large Data Bases, pp. 487–499. Morgan Kaufmann, Berlin (1994)
4. Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proc. 2001 IEEE Symposium on Security and Privacy, pp. 130–143. IEEE Computer Society, Oakland (2001)
5. Peng, L.: DAIS: A real-time data attack isolation system for commercial database applications. In: 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 219–229. IEEE Press, New Orleans (2001)