1. IBM: Ponemon Institute: 2018 Cost of a data breach study: a global overview.
https://www.ibm.com/security/data-breach
. Accessed 15 Aug 2019
2. Verizon RISK Team: Data breach investigations report.
https://enterprise.verizon.com/resources/reports/DBIR_2018_Report_execsummary.pdf
. Accessed 25 Dec 2019
3. Na, W.: Anomaly detection and assessment of user behavior for database access. M.S. thesis, Southeast Univ., Jiangsu, China (2017)
4. Dapeng, C.: Intrusion detection system of database based on user behavior of analysis and identification. M.S. thesis, Univ. of Electronic Science and Technology, Sichuan, China (2015)
5. Xiqiang, D.: Research on database intrusion detection based on data mining. M.S. thesis, Jiangsu Univ., Jiangsu, China (2009)