Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference37 articles.
1. Inmon WH (1991) Building the data warehouse. Wiley and Sons, New York
2. Santos RJ, Bernardino J, Vieira M (2014) Approaches and challenges in database intrusion detection. ACM SIGMOD Rec 43:36–47
3. Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion-detection systems. Springer, Heidelberg 31:805–822. https://doi.org/10.1016/S1389-1286(98)00017-6
4. Thuraisingham B, Iyer S (2007) Extended RBAC—based design and implementation for a secure data warehouse. ARES’07. IEEE, Vienna, pp 367–382
5. Santos RJ, Bernardino J, Vieira M (2013) DBMS application layer intrusion detection for data warehouses. In: Building sustainable information systems. Springer, Boston
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献