Login / Signup
Mitigation of Malicious Modifications by Insiders in Databases.
Harini Ragavan
Brajendra Panda
Published in:
ICISS (2011)
Keyphrases
</>
databases
insider threat
database
relational databases
knowledge discovery
database systems
data sets
data structure
data management
real time
neural network
real world
artificial intelligence
social networks
malicious users