Login / Signup

Database intrusion detection based on user query frequent itemsets mining with item constraints.

Yong ZhongXiaolin Qin
Published in: InfoSecu (2004)
Keyphrases