Databases Reference
In-Depth Information
57. Pang-Ning Tan, Michael Steinbach, and Vipin Kumar, editors. Introduction to
Data Mining . Addison-Wesley, 2006.
58. Jaideep Vaidya, Vijayalakshmi Atluri, and Qi Guo. The role mining problem:
finding a minimal descriptive set of roles. In 12th ACM Symposium on Access
Control Models and Technologies (SACMAT07) , pages 175-184, 2007.
59. Hai Wang and Peng Liu. Modeling and evaluating the survivability of an in-
trusion tolerant database system. In 11th European Symposium on Research in
Computer Security (ESORICS06) , pages 207-224, 2006.
60. Dit-Yan Yeung and Yuxin Ding. User profiling for intrusion detection using
dynamic and static behavioral models. In Advances in Knowledge Discovery
and Data Mining, 6th Pacific-Asia Conference (PAKDD 2002) , pages 494-505,
2002.
Search WWH ::




Custom Search