Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BUKU][B] Data leakage detection/prevention solutions
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …
focused on finding sensitive data as they left the organizational network by monitoring data …
A data-centric approach to insider attack detection in database systems
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …
Authorized users may abuse legitimate privileges to masquerade as other users or to …
Approaches and challenges in database intrusion detection
Databases often support enterprise business and store its secrets. This means that securing
them from data damage and information leakage is critical. In order to deal with intrusions …
them from data damage and information leakage is critical. In order to deal with intrusions …
DoubleGuard: Detecting intrusions in multitier web applications
Internet services and applications have become an inextricable part of daily life, enabling
communication and the management of personal information from anywhere. To …
communication and the management of personal information from anywhere. To …
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
Studies show that a significant portion of networked computers are infected with stealthy
malware. Infection allows remote attackers to control, utilize, or spy on victim machines …
malware. Infection allows remote attackers to control, utilize, or spy on victim machines …
Anomalous query access detection in RBAC-administered databases with random forest and PCA
CA Ronao, SB Cho - Information Sciences, 2016 - Elsevier
Relational databases are created for the purpose of handling and organizing sensitive data
for organizations as well as for individuals. Although database security mechanisms and …
for organizations as well as for individuals. Although database security mechanisms and …
A survey on data security in data warehousing: Issues, challenges and opportunities
RJ Santos, J Bernardino… - 2011 IEEE EUROCON …, 2011 - ieeexplore.ieee.org
Data Warehouses (DWs) are the enterprise's most valuable assets in what concerns critical
business information, making them an appealing target for malicious inside and outside …
business information, making them an appealing target for malicious inside and outside …
Anomaly detection in large databases using behavioral patterning
H Mazzawi, G Dalal, D Rozenblatz… - 2017 IEEE 33rd …, 2017 - ieeexplore.ieee.org
We present a novel approach for detecting malicious user activity in databases. Specifically,
we propose a new machine learning algorithm for detecting attacks such as a stolen user …
we propose a new machine learning algorithm for detecting attacks such as a stolen user …
Learning SQL for database intrusion detection using context-sensitive modelling
C Bockermann, M Apel, M Meier - … on Detection of Intrusions and Malware …, 2009 - Springer
Modern multi-tier application systems are generally based on high performance database
systems in order to process and store business information. Containing valuable business …
systems in order to process and store business information. Containing valuable business …
Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
Database systems have become imperative for organisations around the world to store and
analyse information. However, as one of the ramifications of a massive surge in cloud-based …
analyse information. However, as one of the ramifications of a massive surge in cloud-based …