Insider attack detection in database with deep metric neural network with Monte Carlo sampling
Author:
Affiliation:
1. Yonsei University Department of Computer Science, , Seoul 03722, South Korea and Samsung Electronics, Co., Ltd., Suwon 16706, South Korea
2. Yonsei University Department of Computer Science, , Seoul 03722, South Korea
Abstract
Publisher
Oxford University Press (OUP)
Subject
Logic
Link
https://academic.oup.com/jigpal/article-pdf/30/6/979/47058127/jzac007.pdf
Reference29 articles.
1. A data-centric approach to insider attack detection in database systems;Mathew;International Workshop on Recent Advances in Intrusion Detection,2010
2. Database security: what students need to know;Murray;Journal of Information Technology Education: Innovates in Practice,2010
3. Architecture for Data Collection in Database Intrusion Detection Systems
4. Database security: concepts, approaches and challenges;Bertino;IEEE Transactions on Dependable and Secure Computing,2005
5. Proposed NIST standard for role-based access control;Ferraiolo;Security,2001
Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Novel adaptive approach for anomaly detection in nonlinear and time-varying industrial systems;Logic Journal of the IGPL;2024-05-14
2. Research Opportunity of Insider Threat Detection based on Machine Learning Methods;2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC);2023-02-20
3. Evaluating Classifiers’ Performance to Detect Attacks in Website Traffic;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05
4. Dimensionality-Reduction Methods for the Analysis of Web Traffic;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05
5. An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3