|
Volumn , Issue , 2003, Pages 329-335
|
Identification of malicious transactions in database systems
|
Author keywords
[No Author keywords available]
|
Indexed keywords
DATA DEPENDENCIES;
DATA ITEMS;
DATA UPDATE;
DATABASE LOGS;
HOST-BASED INTRUSION DETECTION SYSTEM;
MALICIOUS TRANSACTION;
TASK LEVELS;
USER TRANSACTION;
INTRUSION DETECTION;
PETRI NETS;
DATABASE SYSTEMS;
|
EID: 38049029757
PISSN: 10988068
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/IDEAS.2003.1214946 Document Type: Conference Paper |
Times cited : (58)
|
References (16)
|