-
1
-
-
3242808612
-
Computer Security Institute
-
Gordon, L. Loeb, M., Lucyshyn, W. and Richardson, R. Computer Security Institute. Computer crime and security survey, 2006.
-
(2006)
Computer crime and security survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
2
-
-
56749169851
-
Online detection of malicious data access using DBMS auditing
-
SAC '08. ACM, New York, NY
-
Fonseca, J., Vieira, M., and Madeira, H. Online detection of malicious data access using DBMS auditing. In Proceedings of the 2008 ACM Symposium on Applied Computing. SAC '08. ACM, New York, NY, 1013-1020, 2008.
-
(2008)
Proceedings of the 2008 ACM Symposium on Applied Computing
, pp. 1013-1020
-
-
Fonseca, J.1
Vieira, M.2
Madeira, H.3
-
3
-
-
1642409662
-
DEMIDS: A misuse detection system for database systems
-
Norwell, MA
-
Chung, C. Y., Gertz, M., Levitt, K. DEMIDS: a misuse detection system for database systems. In integrity and internal Control information Systems: Strategic Views on the Need For Control, Norwell, MA, 159-178, 2000.
-
(2000)
In integrity and internal Control information Systems: Strategic Views on the Need For Control
, pp. 159-178
-
-
Chung, C.Y.1
Gertz, M.2
Levitt, K.3
-
4
-
-
84956982801
-
Learning Fingerprints for a Database IDS
-
Proceedings of the 7th European Symposium on Research in Comp. Security, Springer-Verlag, London
-
Lee, S. Y., Low, W. L., and Wong, P. Y. Learning Fingerprints for a Database IDS. In Proceedings of the 7th European Symposium on Research in Comp. Security. LNCS, vol. 2502. Springer-Verlag, London, 264-280, 2002.
-
(2002)
LNCS
, vol.2502
, pp. 264-280
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
5
-
-
38049029757
-
-
th Intl. Database Engineering and Applications Symposium (IDEAS'03), 2003
-
th Intl. Database Engineering and Applications Symposium (IDEAS'03), 2003
-
-
-
-
6
-
-
0015397231
-
Problem Decomposition and Data Reorganization by a Clustering Technique
-
McCormick W., Schweitzer P., White, T. Problem Decomposition and Data Reorganization by a Clustering Technique, Operations Research. 993-1009, 1972.
-
(1972)
Operations Research
, vol.993-1009
-
-
McCormick, W.1
Schweitzer, P.2
White, T.3
-
7
-
-
0021625744
-
Vertical partitioning algorithms for database design
-
Navathe, S., Ceri, S., Wiederhold, G., and Dou, J. Vertical partitioning algorithms for database design. ACM Trans. Database Syst. 9, pp. 680-710, 1984.
-
(1984)
ACM Trans. Database Syst
, vol.9
, pp. 680-710
-
-
Navathe, S.1
Ceri, S.2
Wiederhold, G.3
Dou, J.4
-
8
-
-
74749105434
-
-
Ramakrishnan, R. and Gehrke, J. Database Management Systems. 3rd. McGraw-Hill. 2002
-
Ramakrishnan, R. and Gehrke, J. Database Management Systems. 3rd. McGraw-Hill. 2002
-
-
-
-
9
-
-
33847275237
-
-
December 12-14, PRDC. IEEE Computer Society, Washington, DC
-
Vieira, M. and Madeira, H. Detection of Malicious Transactions in DBMS. In Proceedings of the 11th Pacific Rim international Symposium on Dependable Computing (December 12-14, 2005). PRDC. IEEE Computer Society, Washington, DC, 350-357, 2005
-
(2005)
Proceedings of the 11th Pacific Rim international Symposium on Dependable Computing, Detection of Malicious Transactions in DBMS
, pp. 350-357
-
-
Vieira, M.1
Madeira, H.2
-
10
-
-
33846299959
-
Intrusion Detection in RBAC-administered Databases
-
ACSAC IEEE Computer Society, Washington, DC
-
Bertino, E., Kamra, A., Terzi, E., and Vakali, A. 2005. Intrusion Detection in RBAC-administered Databases. In Proceedings of the 21st Annual Computer Security Applications Conference. ACSAC IEEE Computer Society, Washington, DC, 170-182, 2005
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 170-182
-
-
Bertino, E.1
Kamra, A.2
Terzi, E.3
Vakali, A.4
-
11
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Schonlau, M. and Theus, M. Detecting masquerades in intrusion detection based on unpopular commands. In Information Processing Letters, vol. 76, 33-38, 2000.
-
(2000)
Information Processing Letters
, vol.76
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
12
-
-
64749095206
-
Optimal security hardening using multi-objective optimization on attack tree models of networks
-
Dewri, R., Nayot, P., Indrajit, R., Whitley, D.: Optimal security hardening using multi-objective optimization on attack tree models of networks. In ACM Conference on Computer and Communications Security, 204-213, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 204-213
-
-
Dewri, R.1
Nayot, P.2
Indrajit, R.3
Whitley, D.4
-
13
-
-
33646031830
-
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
-
Milan, Italy, pp
-
Ray, I., and Poolsappasit, N. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In ESORICS 2005, Milan, Italy, pp. 231-246, 2005.
-
(2005)
ESORICS
, pp. 231-246
-
-
Ray, I.1
Poolsappasit, N.2
|