-
1
-
-
1642409662
-
DEMIDS: A Misuse Detection System for Database Systems
-
Chung, C.Y., Gertz, M., and Levitt, K. 1999. DEMIDS: A Misuse Detection System for Database Systems. In proceedings of the Conference on Integrity and Internal Control in Information Systems, 159-178.
-
(1999)
Proceedings of the Conference on Integrity and Internal Control in Information Systems
, pp. 159-178
-
-
Chung, C.Y.1
Gertz, M.2
Levitt, K.3
-
3
-
-
46749133616
-
Detecting Anomalous Access Patterns in Relational Databases
-
Kamra, A., Terzi, E., Evimaria, and Bertino, E. 2008. Detecting Anomalous Access Patterns in Relational Databases. International Journal on Very Large Databases, 17, 5, 1063-1077.
-
(2008)
International Journal on Very Large Databases
, vol.17
, Issue.5
, pp. 1063-1077
-
-
Kamra, A.1
Terzi, E.2
Evimaria3
Bertino, E.4
-
4
-
-
78650134451
-
-
Technical Report
-
Sunu, M., Michalis, P., Hung, N., and Shambhu, U. 2009. A Data-Centric Approach to Insider Attack Detection in Database Systems. Technical Report.
-
(2009)
A Data-Centric Approach to Insider Attack Detection in Database Systems
-
-
Sunu, M.1
Michalis, P.2
Hung, N.3
Shambhu, U.4
-
5
-
-
84947399464
-
A theory for Record Linkage
-
Fellegi, I. P., and Sunter, A. B. 1969. A theory for Record Linkage. Journal of American Statistical Society , 64, 328, 1183-1210.
-
(1969)
Journal of American Statistical Society
, vol.64
, Issue.328
, pp. 1183-1210
-
-
Fellegi, I.P.1
Sunter, A.B.2
-
6
-
-
0001139918
-
Record linkage: Making maximum use of the discriminating power of identifying information
-
Newcombe, H. B., and Kennedy, J. M. 1962. Record linkage: making maximum use of the discriminating power of identifying information. Communications of the ACM , 5, 11, 563-566.
-
(1962)
Communications of the ACM
, vol.5
, Issue.11
, pp. 563-566
-
-
Newcombe, H.B.1
Kennedy, J.M.2
-
7
-
-
33846428121
-
Quality and Complexity Measures for Data Linkage and Deduplications
-
F. Guillet, and H. J. Hammilton Ed. Springer,Berlin / Heidelberg
-
Christen, P., and Goiser, K. 2007. Quality and Complexity Measures for Data Linkage and Deduplications. In Quality Measures in Data Mining, F. Guillet, and H. J. Hammilton Ed. Springer,Berlin / Heidelberg. 127-151.
-
(2007)
Quality Measures in Data Mining
, pp. 127-151
-
-
Christen, P.1
Goiser, K.2
-
8
-
-
0032091575
-
Integration of heterogeneous databases without common domains using queries based on textual similarity
-
Cohen W.W. 1998. Integration of heterogeneous databases without common domains using queries based on textual similarity. In Proceedings of ACM SIGMOD, Seattle, 201-212.
-
(1998)
Proceedings of ACM SIGMOD, Seattle
, pp. 201-212
-
-
Cohen, W.W.1
-
9
-
-
0033891155
-
An extensible framework for data cleaning
-
Galhardas, H., Florescu, D., and Shasha, D., Simon, E. 2000. An extensible framework for data cleaning. In Proceedings of ICDE, 312.
-
(2000)
Proceedings of ICDE
, pp. 312
-
-
Galhardas, H.1
Florescu, D.2
Shasha, D.3
Simon, E.4
-
10
-
-
0037867900
-
Two approaches to handling noisy variation in text mining
-
Nahm, U.Y., Bilenko, M., and Mooney, R.J. 2002. Two approaches to handling noisy variation in text mining. In Proceedings of the ICML-2002 workshop on text learning (Sydney, Australia), 18-27.
-
(2002)
Proceedings of the ICML-2002 Workshop on Text Learning (Sydney, Australia)
, pp. 18-27
-
-
Nahm, U.Y.1
Bilenko, M.2
Mooney, R.J.3
-
11
-
-
0034592784
-
Efficient clustering of high-dimensional datasets with application to reference matching
-
Mccallum, A., Nigam, K., and Ungar, L.H. 2000. Efficient clustering of high-dimensional datasets with application to reference matching. In Proceedings of ACM SIGKDD, Boston, 169-178.
-
(2000)
Proceedings of ACM SIGKDD, Boston
, pp. 169-178
-
-
Mccallum, A.1
Nigam, K.2
Ungar, L.H.3
-
14
-
-
56749169851
-
Online Detection of Malicious Data Access Using DBMS Auditing
-
Fonseca, J., Vieira, M., and Madeira, H. 2008. Online Detection of Malicious Data Access Using DBMS Auditing. In Proceedings of the 2008 ACM symposium on Applied Computing, 1013-1020.
-
(2008)
Proceedings of the 2008 ACM Symposium on Applied Computing
, pp. 1013-1020
-
-
Fonseca, J.1
Vieira, M.2
Madeira, H.3
-
16
-
-
84956982801
-
Learning Fingerprints for a Database Intrusion Detection System
-
Lee, S.Y., Low, W.L. and Wong, P.Y. 2002. Learning Fingerprints for a Database Intrusion Detection System. In Proceedings of the ESORICS, (Zurich, Switzerland, October 14-16, 2002). 2502, 2002, 264-279.
-
(2002)
Proceedings of the ESORICS, (Zurich, Switzerland, October 14-16, 2002)
, vol.2502
, Issue.2002
, pp. 264-279
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
17
-
-
26444449929
-
A Comprehensive Approach to Anomaly Detection in Relational Databases
-
Spalka, E., and Lehnhardt, J. 2005. A Comprehensive Approach to Anomaly Detection in Relational Databases. In Proceedings of the Annual Working Conference on Data and Applications Security. 3654, 2005, 207-211.
-
(2005)
Proceedings of the Annual Working Conference on Data and Applications Security
, vol.3654
, Issue.2005
, pp. 207-211
-
-
Spalka, E.1
Lehnhardt, J.2
-
18
-
-
70350394979
-
Database Intrusion Detection using Weighted Sequence Mining
-
Srivastava, A., Sural, S., and Majumdar, A.K. 2006. Database Intrusion Detection using Weighted Sequence Mining. Journal of Computers, 1, 4. 8-17.
-
(2006)
Journal of Computers
, vol.1
, Issue.4
, pp. 8-17
-
-
Srivastava, A.1
Sural, S.2
Majumdar, A.K.3
-
22
-
-
34548269884
-
WEKA - A Machine Learning Workbench for Data Mining
-
Frank, E., Hall, M. A., Holmes, G., Kirkby, R., and Pfahringer, B. 2005. WEKA - A Machine Learning Workbench for Data Mining. The Data Mining and Knowledge Discovery Handbook, 1305-1314.
-
(2005)
The Data Mining and Knowledge Discovery Handbook
, pp. 1305-1314
-
-
Frank, E.1
Hall, M.A.2
Holmes, G.3
Kirkby, R.4
Pfahringer, B.5
|