[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/342030.342078guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

DEMIDS: a misuse detection system for database systems

Published: 01 June 2000 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2016)PANDDEProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857710(267-276)Online publication date: 9-Mar-2016
  • (2015)A Dynamic Approach to Detect Anomalous Queries on Relational DatabasesProceedings of the 5th ACM Conference on Data and Application Security and Privacy10.1145/2699026.2699120(245-252)Online publication date: 2-Mar-2015
  • (2014)Hunting the UnknownProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_16(243-259)Online publication date: 14-Jul-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide books
Integrity and internal control information systems: strategic views on the need for control
June 2000
188 pages
ISBN:0792378210

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 June 2000

Qualifiers

  • Chapter

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)PANDDEProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857710(267-276)Online publication date: 9-Mar-2016
  • (2015)A Dynamic Approach to Detect Anomalous Queries on Relational DatabasesProceedings of the 5th ACM Conference on Data and Application Security and Privacy10.1145/2699026.2699120(245-252)Online publication date: 2-Mar-2015
  • (2014)Hunting the UnknownProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_16(243-259)Online publication date: 14-Jul-2014
  • (2013)Self-protecting and self-optimizing database systemsProceedings of the 2013 ACM Cloud and Autonomic Computing Conference10.1145/2494621.2494631(1-10)Online publication date: 9-Aug-2013
  • (2013)PostgreSQL anomalous query detectorProceedings of the 16th International Conference on Extending Database Technology10.1145/2452376.2452469(741-744)Online publication date: 18-Mar-2013
  • (2012)A proposed model for data warehouse user behaviour using intrusion detection systemACM SIGSOFT Software Engineering Notes10.1145/2382756.238277137:6(1-7)Online publication date: 27-Nov-2012
  • (2012)A trust-and-risk aware RBAC frameworkProceedings of the 17th ACM symposium on Access Control Models and Technologies10.1145/2295136.2295168(167-176)Online publication date: 20-Jun-2012
  • (2012)SENTINELProceedings of the second ACM conference on Data and Application Security and Privacy10.1145/2133601.2133605(25-36)Online publication date: 7-Feb-2012
  • (2012)Process mining and securityProceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics10.1007/978-3-642-30428-6_7(81-95)Online publication date: 29-May-2012
  • (2011)Detection of anomalies from user profiles generated from system logsProceedings of the Ninth Australasian Information Security Conference - Volume 11610.5555/2460416.2460421(23-32)Online publication date: 17-Jan-2011
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media