Author:
Keyvanpour Mohamad Reza,Barani Shirzad Mehrnoush,Mehmandoost Samaneh
Publisher
Springer Science and Business Media LLC
Reference47 articles.
1. Aggarwal CC (2013) An introduction to outlier analysis. In Outlier analysis. Springer, New York, pp 1–40
2. Barbara D, Goel R, Jajodia S (2003) Mining malicious corruption of data with hidden markov models. In: Gudes E, Shenoi S (eds) Research directions in data and applications security, IFIP, vol 128. Springer, Berlin, pp 175–189
3. Bland JM, Altman DG (1996) Statistics notes: measurement error. BMJ 312(7047):1654
4. Bockermann C, Apel M, Meier M (2009) Learning SQL for database intrusion detection using context-sensitive modelling|. In: Flegel U, Bruschi D (eds) DIMVA 2009. LNCS, vol 5587. Springer, Heidelberg, pp 196–205
5. Bu SJ, Cho SB (2017) A hybrid system of deep learning and learning classifier system for database intrusion detection. In: Martínez de Pisón F, Urraca R, Quintián H, Corchado E (Eds.). Hybrid artificial intelligent systems. HAIS 2017. Lecture notes in computer science, Vol. 10334. Springer, Cham
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献