Login / Signup
Responding to Anomalous Database Requests.
Ashish Kamra
Elisa Bertino
Rimma V. Nehme
Published in:
Secure Data Management (2008)
Keyphrases
</>
database
databases
database management
relational databases
database systems
anomaly detection
query language
data sets
database applications
information systems
multimedia
similarity measure
multiscale
expert systems
metadata
data model
hidden markov models
feature selection
probabilistic model
data management
intrusion detection
artificial intelligence
learning algorithm