Login / Signup

An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems.

Bharat GuptaDeepak AroraVishal Jha
Published in: ICISTM (2010)
Keyphrases