Login / Signup
Detecting intrusion transactions in databases using data item dependencies and anomaly analysis.
Sattar Hashemi
Ying Yang
Davoud Zabihzadeh
Mohammad Reza Kangavari
Published in:
Expert Syst. J. Knowl. Eng. (2008)
Keyphrases
</>
database
databases
data analysis
data sets
statistical analysis
data collection
database systems
raw data
data sources
data exploration
image data
data mining techniques
original data
intrusion detection
data integrity
correlation analysis
data quality
synthetic data
data structure
high quality
missing data
database management systems
database queries
data retrieval
data processing
xml documents