共 50 条
- [1] Detecting anomalous access patterns in relational databases [J]. The VLDB Journal, 2008, 17 : 1063 - 1077
- [2] Detecting Implicit Meta-Patterns in Relational Databases [J]. IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL I (POST-CONFERENCE EDITION), 2010, : 162 - 164
- [3] Random Forests with Weighted Voting for Anomalous Query Access Detection in Relational Databases [J]. ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, PT II (ICAISC 2015), 2015, 9120 : 36 - 48
- [5] CONCEPTUAL DESIGN PATTERNS FOR RELATIONAL DATABASES [J]. INFORMATION TECHNOLOGIES' 2011, 2011, : 239 - 246
- [6] Processing sequential patterns in relational databases [J]. DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2005, 3589 : 438 - 447
- [7] THE DESIGN OF OPTIMAL ACCESS PATHS FOR RELATIONAL DATABASES [J]. INFORMATION SYSTEMS, 1987, 12 (02) : 203 - 213
- [9] Discovering relational patterns across multiple databases [J]. 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 701 - +
- [10] Modeling and Detecting Anomalous Topic Access [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 100 - 105