Database intrusion detection using weighted sequence mining

被引:20
|
作者
School of Information Technology, Indian Institute of Technology, Kharagpur, 721302, India [1 ]
不详 [2 ]
机构
来源
J. Comput. | 2006年 / 4卷 / 8-17期
关键词
D O I
10.4304/jcp.1.4.8-17
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Database Intrusion Detection using Weighted Sequence Mining
    Srivastava, Abhinav
    Sural, Shamik
    Majumdar, A. K.
    JOURNAL OF COMPUTERS, 2006, 1 (04) : 8 - 17
  • [2] Database intrusion detection using sequence alignment
    Kundu, Amlan
    Sural, Shamik
    Majumdar, A. K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (03) : 179 - 191
  • [3] Database intrusion detection using sequence alignment
    Amlan Kundu
    Shamik Sural
    A. K. Majumdar
    International Journal of Information Security, 2010, 9 : 179 - 191
  • [4] Weighted intra-transactional rule mining for database intrusion detection
    Srivastava, Abhinav
    Sural, Shamik
    Majumdar, A. K.
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 611 - 620
  • [5] DATABASE INTRUSION DETECTION USING SEQUENTIAL DATA MINING APPROACHES
    Abd Elaziz, Pakinam Elamein
    Sobh, Mohamed
    Mohamed, Hoda K.
    2014 9TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2014, : 104 - 111
  • [6] An Effective Log Mining Approach for Database Intrusion Detection
    Hu, Yi
    Campan, Alina
    Walden, James
    Vorobyeva, Irina
    Shelton, Justin
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [7] Weighted LSTM for intrusion detection and data mining to prevent attacks
    Amar, Meryem
    El Ouahidi, Bouabid
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2020, 12 (03) : 308 - 329
  • [8] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306
  • [9] Implementation of sequence patterns mining in network intrusion detection system
    Yang, XR
    Song, QB
    Shen, JY
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E19 - E23
  • [10] Mining Inter-transaction Data Dependencies for Database Intrusion Detection
    Hu, Yi
    Panda, Brajendra
    INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 67 - +