Login / Signup

Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems.

Yi HuBrajendra Panda
Published in: J. Netw. Syst. Manag. (2005)
Keyphrases
  • database systems
  • detection method
  • databases
  • data analysis
  • database
  • data model