Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference47 articles.
1. Agrawal R, Srikant R (1994) Fast algorithms for mining association rules in large databases. In: Proceedings of the 20th International Conference on Very Large Data Bases, VLDB ’94. Morgan Kaufmann Publishers Inc, San Francisco, pp 487–499
2. Agrawal R, Srikant R (1995) Mining sequential patterns. In: Proceedings of the Eleventh International Conference on Data Engineering, ICDE ’95. IEEE Computer Society, pp 3–14
3. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160
4. Bertino E, Sandhu R (2005) Database security—concepts, approaches, and challenges. IEEE Trans Depend Secure Comput 2(1):2–19
5. Bertino E, Terzi E, Kamra A, Vakali A (2005) Intrusion detection in RBAC-administered databases. In: 21st Annual Computer Security Applications Conference (ACSAC’05), pp 10–182
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Intelligent Customer Behaviour Analysis in the Norwegian Market;2024 IEEE 40th International Conference on Data Engineering Workshops (ICDEW);2024-05-13