Cited By
View all- Wang YDong GBai JDeng STang DLiu S(2024)A Method for Modeling Normal User Behavior Based on Security Risk Audit Elements2024 IEEE 16th International Conference on Advanced Infocomm Technology (ICAIT)10.1109/ICAIT62580.2024.10807894(238-243)Online publication date: 16-Aug-2024
- Morzy TZakrzewicz M(2024)A Study on Database Intrusion Detection Based on Query Execution PlansBig Data Analytics and Knowledge Discovery10.1007/978-3-031-68323-7_30(353-358)Online publication date: 26-Aug-2024
- Guan HChen ZSong S(2023)CORE-Sketch: On Exact Computation of Median Absolute Deviation with Limited SpaceProceedings of the VLDB Endowment10.14778/3611479.361149116:11(2832-2844)Online publication date: 24-Aug-2023
- Show More Cited By