Sign in

Detecting anomalous access patterns in relational databases.

Ashish KamraEvimaria TerziElisa Bertino
Published in: VLDB J. (2008)
Keyphrases