Detecting intrusion transactions in databases using data item dependencies and anomaly analysis.
Sattar HashemiYing YangDavoud ZabihzadehMohammad Reza KangavariPublished in: Expert Syst. J. Knowl. Eng. (2008)
Keyphrases
- database
- databases
- data analysis
- data sets
- statistical analysis
- data collection
- database systems
- raw data
- data sources
- data exploration
- image data
- data mining techniques
- original data
- intrusion detection
- data integrity
- correlation analysis
- data quality
- synthetic data
- data structure
- high quality
- missing data
- database management systems
- database queries
- data retrieval
- data processing
- xml documents