Login / Signup

An effective log mining approach for database intrusion detection.

Yi HuAlina CampanJames WaldenIrina VorobyevaJustin Shelton
Published in: SMC (2010)
Keyphrases