Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
relational database management systems
biblio
Vulnerabilities and Threat Management in Relational Database Management Systems
Submitted by grigby1 on Fri, 03/17/2023 - 11:15am
Cryptography
relational database management systems
Heart
relational database security
Database systems
SQL injection
SQL
computer security
composability
Access Control
encryption
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
relational databases
biblio
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Loss measurement
privacy models and measurement
relational database management systems
querying behaviour
quantitative measure
privacy-loss score
PriDe measure
N-gram model
interactive querying settings
Electronic Privacy
behavioural profiles
data privacy
Urban areas
Analytical models
SQL query
SQL
Databases
query processing
Metrics
privacy
pubcrawl
Data models
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases