Sciweavers

150 search results - page 6 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
VIZSEC
2005
Springer
14 years 1 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
NGC
2007
Springer
150views Communications» more  NGC 2007»
13 years 7 months ago
Exploiting Temporal Relations in Mining Hepatitis Data
Various data mining methods have been developed last few years for hepatitis study using a large temporal and relational database given to the research community. In this work we i...
Tu Bao Ho, Canh Hao Nguyen, Saori Kawasaki, Si Qua...
RAID
2010
Springer
13 years 6 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
AIIA
2007
Springer
14 years 1 months ago
Discovering Relational Emerging Patterns
The discovery of emerging patterns (EPs) is a descriptive data mining task defined for pre-classified data. It aims at detecting patterns which contrast two classes and has been ...
Annalisa Appice, Michelangelo Ceci, Carlo Malgieri...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 9 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin