共 20 条
[1]
Bertino E, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P155
[2]
Bertino E., 2012, SYNTHESIS LECT DATA, V4, P1, DOI [DOI 10.2200/S00431ED1V01Y201207DTM028, 10.2200/S00431ED1V01Y201207DTM028]
[3]
Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases
[J].
PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3,
2009,
:1616-+
[4]
Chung C. Y., 2000, DEMIDS MISUSE DETECT, P159, DOI DOI 10.1007/978-0-387-35501-612
[5]
Gulgezen G, 2009, LECT NOTES ARTIF INT, V5781, P455, DOI 10.1007/978-3-642-04180-8_47
[6]
Hu Y, 2003, SEVENTH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, P329
[7]
Hussain S.R., 2015, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, P25
[8]
IBM, IBM INFOSPHERE GUARD
[9]
Detecting anomalous access patterns in relational databases
[J].
VLDB JOURNAL,
2008, 17 (05)
:1063-1077