A Comprehensive Approach to Anomaly Detection in Relational Databases

Author:

Spalka Adrian,Lehnhardt Jan

Publisher

Springer Berlin Heidelberg

Reference8 articles.

1. Axelsson, S.:Intrusion Detection Systems: A Survey and Taxonomy’. Technical Report 99.15 Dept. of Computer Engineering, Chalmers University of Technology, Sweden (2000)

2. Burgess, M., Haugerud, H., Straumsnes, S., Reitan, T.: Measuring system normality. ACM Transactions on Computer Systems 20(2), 125–160 (2002)

3. Chung, Yip, C., Gertz, M., Levitt, K.: DEMIDS: A misuse detection system for database systems. In: IFIP WG11.5 3rd Working Conference on Integrity and Internal Control in Information Systems, pp. 159–178. Kluwer Academic Publishers, Dordrecht (1999)

4. Gao, D., Reiter, M.K., Song, D.: Gray-box extraction of execution graphs for anomaly detection. In: 11th ACM Conference on Computer and Communications Security, pp. 318–329. ACM Computer Press, New York (2004)

5. Gertz, M.: Data Content Monitoring for Security, Integrity and Availability: A Mission-Critical Line of Defense. In: IICIS 2002: IFIP WG11.5 5th Working Conference on Integrity and Internal Control in Information Systems, pp. 189–201. Kluwer Academic Publishers, Dordrecht (2003)

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01

2. Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining;Cluster Computing;2022-06-01

3. Log-Based Malicious Activity Detection Using Machine and Deep Learning;Malware Analysis Using Artificial Intelligence and Deep Learning;2020-12-21

4. Application of SQL in Data Management about TBM Breaking Test Machine;IOP Conference Series: Materials Science and Engineering;2018-12-12

5. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3