Author:
U Kumaran,Karuturi Sreya Chowdary,Veeramaneni Asritha,Balasubaramanian Sundaravadivazhagn,Srivani TunuguntlaAasritha
Reference36 articles.
1. xVDB: A High-Coverage Approach for Constructing a Vulnerability Database;H Hong;IEEE Access
2. Search Condition-Hiding Query Evaluation on Encrypted Databases;M Kim;IEEE Access,2019
3. SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases;Y Zheng;IEEE Transactions on Knowledge and Data Engineering,2023
4. Application of Danger Theory for Anomaly Detection on Technological Data;B Bredikhin;2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT),2023
5. Secure databases: constraints, inference channels, and monitoring disclosures;A Brodsky;IEEE Transactions on Knowledge and Data Engineering,2000