Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DetAnom: Detecting Anomalous Database Transactions by Insiders., , and . CODASPY, page 25-35. ACM, (2015)An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs., , and . ICDE, page 265-276. IEEE, (2020)Result-Based Detection of Insider Threats to Relational Databases., and . CODASPY, page 133-143. ACM, (2019)PostgreSQL anomalous query detector., , , and . EDBT, page 741-744. ACM, (2013)Detection of Temporal Insider Threats to Relational Databases., and . CIC, page 406-415. IEEE Computer Society, (2017)Detection of Temporal Data Ex-Filtration Threats to Relational Databases., and . CIC, page 146-155. IEEE Computer Society, (2018)M3: Stream Processing on Main-Memory MapReduce., , , , , , and . ICDE, page 1253-1256. IEEE Computer Society, (2012)Techniques and Systems for Anomaly Detection in Database Systems., and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 113-133. Springer, (2018)POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs., and . ACM Conference on Computer and Communications Security, page 1493-1495. ACM, (2014)PANDDE: Provenance-based ANomaly Detection of Data Exfiltration., , and . CODASPY, page 267-276. ACM, (2016)