Author of the publication

On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.

, , and . ICCNS, page 12-17. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable approach for computing distance-bounded node-disjoint paths in optical networks., , , , and . ICTON, page 1-4. IEEE, (2015)Privacy Interpretation of Behaviour-based Anomaly Detection Approaches., , and . SIN, page 1-7. IEEE, (2021)A Comparison between Two Optimisation Alternatives for Mapping in Wireless Network on Chip., , , , and . ICTAI, page 938-945. IEEE Computer Society, (2016)Data Mining for Biodiversity Prediction in Forests., , , , and . ECAI, volume 215 of Frontiers in Artificial Intelligence and Applications, page 289-294. IOS Press, (2010)A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems., , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 18-28. Springer, (2017)PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings., , and . NTMS, page 1-5. IEEE, (2019)Building Reactive Characters for Dynamic Gaming Environments., and . CIG, IEEE, (2005)A Study of Electricity Price Features on Distributed Internet Data Centers., and . GECON, volume 8193 of Lecture Notes in Computer Science, page 60-73. Springer, (2013)Almost Square Packing., and . CPAIOR, volume 6697 of Lecture Notes in Computer Science, page 196-209. Springer, (2011)A Theoretical Framework for Tradeoff Generation using Soft Constraints., and . SGAI Conf., page 69-82. Springer, (2003)