共 50 条
- [12] Identification of malicious transactions in database systems SEVENTH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2003, : 329 - 335
- [13] Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 35 - 45
- [14] Dynamic Recovering of Long Running Transactions TRUSTWORTHY GLOBAL COMPUTING, 2009, 5474 : 201 - +
- [15] Malicious Users' Transactions: Tackling Insider Threat INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 211 - 222
- [17] An auto-generating approach of transactions profile graph in detection of malicious transactions 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 562 - 565
- [19] Recovering an OSPF Network from Malicious Attacks: An Experimental Evaluation of Recovery Techniques 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,