Integrated Intrusion Detection in Databases



Instrusion Detection in DBMS


Third Latin-American Symposium on Dependable Computing (LADC 2007), September 2007

Cited by

Year 2013 : 2 citations

 Elisa Costante, Sokratis Vavilis, Sandro Etall, Milan Petkovic, Nicola Zannone, "Database Anomalous Activities: Detection and Quantification", 10th International Conference on Security and Cryptography, SECRYPT 2013, Reykjavík, Iceland, July 29-31, 2013.

 Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013.

Year 2012 : 1 citations

 1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012.

Year 2011 : 3 citations

 A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat, "Minimize the False Positive Rate in a Database Intrusion Detection System", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3 No 5, October 2011.

 1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011.

 2. Hua Dai, Xiaolin Qin, Guineng Zheng, Ziyue Li, “SQRM: An Effective Solution to Suspicious Users in Database”, The Third International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2011), St. Maarten, The Netherlands Antilles, January, 2011.

Year 2010 : 2 citations

 Dai Hual, Qin Xiaolin, Li Ziyuel, Sun Libin, Wu Don, "A DBSUIM-Based Suspicious User Isolation Mechanism for Database", Journal of Computer Research and Development, 47(Suppl), 2010.

 Dai Hua,Qin Xiaolin?Bai Chuanjie, "A Malicious Transaction Detection Method Based on Transaction Template", Journal of computer research and development, 47(5), 2010.

Year 2009 : 3 citations

 Yawei Zhang, Xiaojun Ye, Feng Xie, Yong Peng, "A Practical Database Intrusion Detection System Framework", Ninth IEEE International Conference on Computer and Information Technology, CIT '09, Xiamen, China, October 11-14, 2009.

 1. Wu, G. Z., Osborn, S. L., Jin, X., “Database Intrusion Detection Using Role Profiling with Role Hierarchy”, 6th VLDB Workshop on Secure Data Management, Lyon, France, August 2009.

 2. Mohammad Hossein Haratian, “An Architectural Design For a Hybrid Intrusion Detection System for Database”, MSc Thesis, Centre for Advanced Software Engineering (CASE), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, April 2009.