Insider Threat Prevention, Detection and Mitigation. Cyber Security and Global Information Assurance: Threat Analysis and Response Solution, 2009. ,
DOI : 10.4018/978-1-60566-326-5.ch003
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, 1987. ,
DOI : 10.1109/SP.1987.10001
DEMIDS: A Misuse Detection System for Database Systems, 14th IFIP WG11.3 Working Conference on Database and Application Security, 2000. ,
DOI : 10.1007/978-0-387-35501-6_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.4874
Learning Fingerprints for a Database Intrusion Detection System, 7th European Symposium on Research in Computer Security, 2002. ,
DOI : 10.1007/3-540-45853-0_16
Detecting anomalous access patterns in relational databases, The VLDB Journal, vol.2, issue.3, pp.1063-1077, 2008. ,
DOI : 10.1007/s00778-007-0051-4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.4302
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems, Journal of Network and Systems Management, vol.13, issue.6, pp.111-125, 2005. ,
DOI : 10.1007/s10922-005-6264-1
A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, issue.4, pp.227-261, 2000. ,
DOI : 10.1145/382912.382914
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.4003
Multi-version attack recovery for workflow systems, 19th Annual Computer Security Applications Conference, 2003. Proceedings., 2003. ,
DOI : 10.1109/CSAC.2003.1254319
Weighted Intra Transaction Rules Mining for Database Intrusion Detection, Proceedings of the Pacific-Asia Knowledge Discovery and Data Mining, 2006. ,
DOI : 10.1007/11731139_71
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, Proceedings of the 10 th European Symposium on Research in Computer Security, 2005. ,
DOI : 10.1007/11555827_14
A behavioral theory of insider-threat risks, ACM Transactions on Modeling and Computer Simulation, vol.18, issue.2, 2008. ,
DOI : 10.1145/1346325.1346328
Predicting and Preventing Insider Threat in Relational Database Systems, 4th Workshop in Information Security Theory and Practice, 2010. ,
DOI : 10.1109/5.24143
URL : https://hal.archives-ouvertes.fr/hal-01056069
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention, 2010 IEEE Second International Conference on Social Computing, 2010. ,
DOI : 10.1109/SocialCom.2010.128
Database Activity Monitoring: Intrusion Detection & Security Auditing, DAM Whitepaper ,
Understanding and Selecting a Database Activity Monitoring Solution ,