Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control for Databases: Concepts and Systems., , and . Found. Trends Databases, 3 (1-2): 1-148 (2011)Responding to Anomalous Database Requests., , and . Secure Data Management, volume 5159 of Lecture Notes in Computer Science, page 50-66. Springer, (2008)Database Intrusion Detection and Response., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 400-401. Springer, (2008)Efficient k -Anonymization Using Clustering Techniques., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 188-200. Springer, (2007)Database Security., , and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Intrusion Detection in RBAC-administered Databases., , , and . ACSAC, page 170-182. IEEE Computer Society, (2005)PostgreSQL anomalous query detector., , , and . EDBT, page 741-744. ACM, (2013)Detecting anomalous access patterns in relational databases., , and . VLDB J., 17 (5): 1063-1077 (2008)Design and Implementation of an Intrusion Response System for Relational Databases., and . IEEE Trans. Knowl. Data Eng., 23 (6): 875-888 (2011)ViWiD : Visible Watermarking Based Defense Against Phishing., , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 470-483. Springer, (2005)