-
1
-
-
78649299251
-
-
Owasp top 10 2007 (2007), http://www.owasp.org/index.php/Top-10-2007
-
(2007)
Owasp Top 10 2007
-
-
-
3
-
-
0345982315
-
Join synopses for approximate query answering
-
Acharya, S., Gibbons, P.B., Poosala, V., Ramaswamy, S.: Join synopses for approximate query answering. In: SIGMOD Conference, pp. 275-286 (1999)
-
(1999)
SIGMOD Conference
, pp. 275-286
-
-
Acharya, S.1
Gibbons, P.B.2
Poosala, V.3
Ramaswamy, S.4
-
5
-
-
1142303671
-
Dynamic sample selection for approximate query processing
-
Babcock, B., Chaudhuri, S., Das, G.: Dynamic sample selection for approximate query processing. In: SIGMOD Conference, pp. 539-550 (2003)
-
(2003)
SIGMOD Conference
, pp. 539-550
-
-
Babcock, B.1
Chaudhuri, S.2
Das, G.3
-
9
-
-
79960570447
-
Why and where: A characterization of data provenance
-
Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: ICDT, pp. 316-330 (2001)
-
(2001)
ICDT
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
10
-
-
0031628670
-
On the decidability of query containment under constraints
-
Calvanese, D., Giacomo, G.D., Lenzerini, M.: On the decidability of query containment under constraints. In: Proc. of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 1998), pp. 149-158 (1998)
-
(1998)
Proc. of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 1998)
, pp. 149-158
-
-
Calvanese, D.1
Giacomo, G.D.2
Lenzerini, M.3
-
12
-
-
0347761807
-
On random sampling over joins
-
Chaudhuri, S., Motwani, R., Narasayya, V.R.: On random sampling over joins. In: SIGMOD Conference, pp. 263-274 (1999)
-
(1999)
SIGMOD Conference
, pp. 263-274
-
-
Chaudhuri, S.1
Motwani, R.2
Narasayya, V.R.3
-
13
-
-
1642409662
-
Demids: A misuse detection system for database systems
-
Kluwer Academic Publishers, Norwell
-
Chung, C.Y., Gertz, M., Levitt, K.: Demids: a misuse detection system for database systems. In: Integrity and Internal Control Information Systems: Strategic Views on the Need for Control, pp. 159-178. Kluwer Academic Publishers, Norwell (2000)
-
(2000)
Integrity and Internal Control Information Systems: Strategic Views on the Need for Control
, pp. 159-178
-
-
Chung, C.Y.1
Gertz, M.2
Levitt, K.3
-
14
-
-
78249232186
-
Microsoft: 2007 E-Crime Watch Survey
-
US Secret Service, CERT
-
CSO Magazine, US Secret Service, CERT, Microsoft: 2007 E-Crime Watch Survey (2007), http://www.sei.cmu.edu/about/press/releases/2007ecrime.html
-
(2007)
CSO Magazine
-
-
-
15
-
-
56749169851
-
Online detection of malicious data access using dbms auditing
-
Fonseca, J., Vieira, M., Madeira, H.: Online detection of malicious data access using dbms auditing. In: Proc. of the 2008 ACM Symposium on Applied Computing (SAC 2008), pp. 1013-1020 (2008)
-
(2008)
Proc. of the 2008 ACM Symposium on Applied Computing (SAC 2008)
, pp. 1013-1020
-
-
Fonseca, J.1
Vieira, M.2
Madeira, H.3
-
18
-
-
46749133616
-
Detecting anomalous access patterns in relational databases
-
Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. The VLDB Journal 17(5), 1063-1077 (2008)
-
(2008)
The VLDB Journal
, vol.17
, Issue.5
, pp. 1063-1077
-
-
Kamra, A.1
Terzi, E.2
Bertino, E.3
-
19
-
-
33244455692
-
Simulatable auditing
-
Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: Proc. of the ACM Symposium on Principles of Database Systems (PODS 2005), pp. 118-127 (2005)
-
(2005)
Proc. of the ACM Symposium on Principles of Database Systems (PODS 2005)
, pp. 118-127
-
-
Kenthapadi, K.1
Mishra, N.2
Nissim, K.3
-
21
-
-
84956982801
-
Learning fingerprints for a database intrusion detection system
-
Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. Springer, Heidelberg
-
Lee, S.Y., Low, W.L., Wong, P.Y.: Learning fingerprints for a database intrusion detection system. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 264-280. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2502
, pp. 264-280
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
22
-
-
0033726106
-
Intrusion detection in real-time database systems via time signatures
-
Lee, V.C., Stankovic, J., Son, S.H.: Intrusion detection in real-time database systems via time signatures. In: Proc. of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000), p. 124 (2000)
-
(2000)
Proc. of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000)
, pp. 124
-
-
Lee, V.C.1
Stankovic, J.2
Son, S.H.3
-
24
-
-
0021439622
-
ON the FOUNDATIONS of the UNIVERSAL RELATION MODEL
-
DOI 10.1145/329.318580
-
Maier, D., Ullman, J.D., Vardi, M.Y.: On the foundations of the universal relation model. ACM Trans. on Database Syst. 9(2), 283-308 (1984) (Pubitemid 14606342)
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.2
, pp. 283-308
-
-
Maier, D.1
Ullman Jeffrey, D.2
Vardi Moshe, Y.3
-
25
-
-
0022821574
-
Simple random sampling from relational databases
-
Olken, F., Rotem, D.: Simple random sampling from relational databases. In: VLDB, pp. 160-169 (1986)
-
(1986)
VLDB
, pp. 160-169
-
-
Olken, F.1
Rotem, D.2
-
26
-
-
33645819683
-
Intelligent multi-agent based database hybrid intrusion prevention system
-
Ramasubramanian, P., Kannan, A.: Intelligent multi-agent based database hybrid intrusion prevention system. In: Benczúr, A.A., Demetrovics, J., Gottlob, G. (eds.) ADBIS 2004. LNCS, vol. 3255, pp. 393-408. Springer, Heidelberg (2004) (Pubitemid 39748866)
-
(2004)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3255
, pp. 393-408
-
-
Ramasubramanian, P.1
Kannan, A.2
-
30
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science 16(1), 58-74 (2001)
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.3
Karr, A.4
Theus, M.5
Vardi, Y.6
-
31
-
-
26444449929
-
A comprehensive approach to anomaly detection in relational databases
-
Spalka, A., Lehnhardt, J.: A comprehensive approach to anomaly detection in relational databases. In: DBSec, pp. 207-221 (2005)
-
(2005)
DBSec
, pp. 207-221
-
-
Spalka, A.1
Lehnhardt, J.2
-
32
-
-
70350394979
-
Database intrusion detection using weighted sequence mining
-
Srivastava, A., Sural, S., Majumdar, A.K.: Database intrusion detection using weighted sequence mining. Journal of Computers 1(4), 8-17 (2006)
-
(2006)
Journal of Computers
, vol.1
, Issue.4
, pp. 8-17
-
-
Srivastava, A.1
Sural, S.2
Majumdar, A.K.3
-
33
-
-
85028807471
-
Implementation of integrity constraints and views by query modification
-
Stonebraker, M.: Implementation of integrity constraints and views by query modification. In: SIGMOD Conference, pp. 65-78 (1975)
-
(1975)
SIGMOD Conference
, pp. 65-78
-
-
Stonebraker, M.1
-
34
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
-
Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of sql attacks. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 123-140. Springer, Heidelberg (2005) (Pubitemid 41423153)
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 123-140
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
-
36
-
-
33846299452
-
Finding and analyzing database user sessions
-
Yao, Q., An, A., Huang, X.: Finding and analyzing database user sessions. In: Proc. of Database Systems for Advanced Applications, pp. 283-308 (2005)
-
(2005)
Proc. of Database Systems for Advanced Applications
, pp. 283-308
-
-
Yao, Q.1
An, A.2
Huang, X.3
|