Partitioning Oracle Attacks.
Julia LenPaul GrubbsThomas RistenpartPublished in: USENIX Security Symposium (2021)
Keyphrases
- countermeasures
- database
- digital image watermarking
- oracle database
- malicious attacks
- data sets
- watermarking scheme
- watermarking algorithm
- security mechanisms
- cyber attacks
- traffic analysis
- partitioning algorithm
- denial of service attacks
- terrorist attacks
- monotonicity constraints
- object oriented
- graph partitioning
- database administration
- website
- attack detection
- malicious users
- databases