Monitoring Database Application Behavior for Intrusion Detection (Short Paper)



Instrusion Detection in DBMS


The IEEE 12th International Symposium Pacific Rim Dependable Computing (PRDC 2006), December 2006

Cited by

Year 2011 : 1 citations

 1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011.

Year 2010 : 1 citations

 1. Yi Hu, Brajendra Panda, "Mining Inter-transaction Data Dependencies for Database Intrusion Detection", Innovations and Advances in Computer Sciences and Engineering, Springer Netherlands, ISBN978-90-481-3657-5, March 2010.

Year 2009 : 1 citations

 1. Mohammad Hossein Haratian, “An Architectural Design For a Hybrid Intrusion Detection System for Database”, MSc Thesis, Centre for Advanced Software Engineering (CASE), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, April 2009.

Year 2007 : 1 citations

 Clay Brockman, "Why Monitoring Database Application Behavior is the Best Database Intrusion Detection Method", Position Paper - ITK 478: Fall 2007, Illinois State University, 2007.