Responding to Anomalous Database Requests.
Ashish KamraElisa BertinoRimma V. NehmePublished in: Secure Data Management (2008)
Keyphrases
- database
- databases
- database management
- relational databases
- database systems
- anomaly detection
- query language
- data sets
- database applications
- information systems
- multimedia
- similarity measure
- multiscale
- expert systems
- metadata
- data model
- hidden markov models
- feature selection
- probabilistic model
- data management
- intrusion detection
- artificial intelligence
- learning algorithm