Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

malicious RDBMS accesses

biblio

Visible to the public Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access

Submitted by aekwall on Mon, 11/04/2019 - 11:23am
  • Insider Threats
  • access control mechanisms
  • and Data mining
  • anomaly-based Intrusion Detection Systems
  • application data
  • data leakage
  • Database intrusion detection
  • Database monitoring
  • detect malicious RDBMS access
  • relational database security
  • malicious access
  • malicious RDBMS accesses
  • persistent concern
  • RDBMS
  • relational database management systems
  • SQL queries
  • towards modelling insiders
  • unauthorized employees
  • Metrics
  • authorisation
  • Big Data
  • Organizations
  • Data models
  • Resiliency
  • Human behavior
  • pubcrawl
  • composability
  • security of data
  • query processing
  • SQL
  • Training
  • Data mining
  • malicious insiders
  • insider attacks
  • relational databases

Terms of Use  |  ©2023. CPS-VO