Author of the publication

Detection of Temporal Insider Threats to Relational Databases.

, and . CIC, page 406-415. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs., , and . ICDE, page 265-276. IEEE, (2020)DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts., , , , , and . IEEE Syst. J., 11 (2): 483-493 (2017)Data and syntax centric anomaly detection for relational databases., , , and . WIREs Data Mining Knowl. Discov., 6 (6): 231-239 (2016)DetAnom: Detecting Anomalous Database Transactions by Insiders., , and . CODASPY, page 25-35. ACM, (2015)Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper)., , , and . IRI, page 20-29. IEEE Computer Society, (2016)PostgreSQL anomalous query detector., , , and . EDBT, page 741-744. ACM, (2013)Result-Based Detection of Insider Threats to Relational Databases., and . CODASPY, page 133-143. ACM, (2019)Detection of Temporal Insider Threats to Relational Databases., and . CIC, page 406-415. IEEE Computer Society, (2017)Detection of Temporal Data Ex-Filtration Threats to Relational Databases., and . CIC, page 146-155. IEEE Computer Society, (2018)M3: Stream Processing on Main-Memory MapReduce., , , , , , and . ICDE, page 1253-1256. IEEE Computer Society, (2012)