-
1
-
-
33846299959
-
Intrusion detection in RBACadministered databases
-
IEEE Computer Society, Los Alamitos
-
Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion detection in RBACadministered databases. In: ACSAC, pp. 170-182. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
ACSAC
, pp. 170-182
-
-
Bertino, E.1
Kamra, A.2
Terzi, E.3
Vakali, A.4
-
2
-
-
35048875879
-
Securing DBMS: Characterizing and detecting queryoods
-
Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
-
Bertino, E., Leggieri, T., Terzi, E.: Securing DBMS: Characterizing and detecting queryoods. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.3225, pp. 195- 206. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3225
, pp. 195-206
-
-
Bertino, E.1
Leggieri, T.2
Terzi, E.3
-
3
-
-
1642409662
-
DEMIDS: A misuse detection system for database systems
-
van Biene-Hershey, M.E., Strous, L. (eds.) Kluwer, Dordrecht
-
Chung, C.Y., Gertz, M., Levitt, K.N.: DEMIDS: A misuse detection system for database systems. In: van Biene-Hershey, M.E., Strous, L. (eds.) IICIS, IFIP Conference Proceedings, vol.165, pp. 159-178. Kluwer, Dordrecht (1999)
-
(1999)
IICIS, IFIP Conference Proceedings
, vol.165
, pp. 159-178
-
-
Chung, C.Y.1
Gertz, M.2
Levitt, K.N.3
-
4
-
-
38149127253
-
Integrated intrusion detection in databases
-
Bondavalli, A., Brasileiro, F., Rajsbaum, S. (eds.) LADC 2007. Springer, Heidelberg
-
Fonseca, J., Vieira, M., Madeira, H.: Integrated intrusion detection in databases. In: Bondavalli, A., Brasileiro, F., Rajsbaum, S. (eds.) LADC 2007. LNCS, vol.4746, pp. 198-211. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4746
, pp. 198-211
-
-
Fonseca, J.1
Vieira, M.2
Madeira, H.3
-
5
-
-
0003478316
-
-
Technical report University of New Mexico Department of Computer Science. August
-
Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system. Technical report, University of New Mexico, Department of Computer Science (August 1990)
-
(1990)
The Architecture of A Network Level Intrusion Detection System
-
-
Heady, R.1
Luger, G.2
MacCabe, A.3
Servilla, M.4
-
6
-
-
30644462262
-
For information technology - Role-based access control
-
American National Standards Institute. January
-
American National Standards Institute. For information technology - role-based access control. ANSI INCITS 359 (January 2004)
-
(2004)
ANSI INCITS 359
-
-
-
7
-
-
46749133616
-
Detecting anomalous access patterns in relational databases
-
Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB Journal 17(5), 1063-1077 (2008)
-
(2008)
VLDB Journal
, vol.17
, Issue.5
, pp. 1063-1077
-
-
Kamra, A.1
Terzi, E.2
Bertino, E.3
-
8
-
-
84956982801
-
Learning fingerprints for a database intrusion detection system
-
Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. Springer, Heidelberg
-
Lee, S.Y., Low, W.L., Wong, P.Y.: Learning fingerprints for a database intrusion detection system. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.2502, pp. 264-280. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2502
, pp. 264-280
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
9
-
-
0033726106
-
Intrusion detection in real-time database systems via time signatures
-
Lee, V.C.S., Stankovic, J.A., Son, S.H.: Intrusion detection in real-time database systems via time signatures. In: IEEE Real Time Technology and Applications Symposium, pp. 124-133 (2000)
-
(2000)
IEEE Real Time Technology and Applications Symposium
, pp. 124-133
-
-
Lee, V.C.S.1
Stankovic, J.A.2
Son, S.H.3
-
10
-
-
84909595754
-
DIDAFIT: Detecting intrusions in databases through fingerprinting transactions
-
Low, W.L., Lee, J., Teoh, P.: DIDAFIT: Detecting intrusions in databases through fingerprinting transactions. In: ICEIS, pp. 121-128 (2002)
-
(2002)
ICEIS
, pp. 121-128
-
-
Low, W.L.1
Lee, J.2
Teoh, P.3
-
12
-
-
84869621771
-
-
Microsoft MSDN. February
-
Microsoft MSDN. AdventureWorks sample OLTP database, http://msdn. microsoft.com/en-us/library/ms124659.aspx (February 2009)
-
(2009)
AdventureWorks Sample OLTP Database
-
-
-
14
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S.L., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3(2), 85-106 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.2
Munawer, Q.3
-
16
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
Julisch, K., Krügel, C. (eds.) DIMVA 2005. Springer, Heidelberg
-
Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol.3548, pp. 123-140. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 123-140
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
|