메뉴 건너뛰기




Volumn , Issue , 2003, Pages 329-335

Identification of malicious transactions in database systems

Author keywords

[No Author keywords available]

Indexed keywords

DATA DEPENDENCIES; DATA ITEMS; DATA UPDATE; DATABASE LOGS; HOST-BASED INTRUSION DETECTION SYSTEM; MALICIOUS TRANSACTION; TASK LEVELS; USER TRANSACTION;

EID: 38049029757     PISSN: 10988068     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IDEAS.2003.1214946     Document Type: Conference Paper
Times cited : (58)

References (16)
  • 1
    • 84962333563 scopus 로고    scopus 로고
    • Defensive information warfare
    • July
    • B. Panda and J. Giordano. Defensive Information Warfare. In Communications of the ACM, Vol. 42, No. 7, pages 31-32, July 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.7 , pp. 31-32
    • Panda, B.1    Giordano, J.2
  • 9
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • W. Lee and S. Stolfo. Data Mining Approaches for Intrusion Detection. In USENIX Security Symposium, 1998.
    • (1998) USENIX Security Symposium
    • Lee, W.1    Stolfo, S.2
  • 12
    • 25144433329 scopus 로고    scopus 로고
    • A host based multi-sour ce information attack detection model design and implementation
    • October
    • B. Panda, R. Yalamanchili. A Host Based Multi-Sour ce Information Attack Detection Model Design and Implementation. In Information: An International Journal, Vol. 4, No. 4, October 2001.
    • (2001) Information: An International Journal , vol.4 , Issue.4
    • Panda, B.1    Yalamanchili, R.2
  • 13
    • 0024645936 scopus 로고
    • Petri-nets properties, analysis and applications
    • April
    • T. Murata. Petri-Nets: Properties, Analysis and Applications. In Proceedings of the IEEE, Vol. 77, No. 4, p. 541-580, April 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 14
    • 0014797273 scopus 로고
    • A relational model for large shared data banks
    • June
    • E. Codd. A Relational Model for Large Shared Data Banks. In Communications of ACM, June 1970.
    • (1970) Communications of ACM
    • Codd, E.1
  • 15
    • 0033871806 scopus 로고    scopus 로고
    • Rewriting histories: Recovering from malicious transactions
    • January
    • P. Liu, P.Ammann, and S. Jajodia. Rewriting Histories: Recovering from Malicious Transactions. In Distributed and Parallel Databases, Vol. 18, No. 1, p. 7-40, January 2000.
    • (2000) Distributed and Parallel Databases , vol.18 , Issue.1 , pp. 7-40
    • Liu, P.1    Ammann, P.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.