R. F. Mills, G. L. Peterson, and M. R. Grimaila, Insider Threat Prevention, Detection and Mitigation. Cyber Security and Global Information Assurance: Threat Analysis and Response Solution, 2009.
DOI : 10.4018/978-1-60566-326-5.ch003

D. Clark and D. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, 1987.
DOI : 10.1109/SP.1987.10001

C. Y. Chung, M. Gertz, and K. Levitt, DEMIDS: A Misuse Detection System for Database Systems, 14th IFIP WG11.3 Working Conference on Database and Application Security, 2000.
DOI : 10.1007/978-0-387-35501-6_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.4874

S. Y. Lee, W. L. Low, and P. Wong, Learning Fingerprints for a Database Intrusion Detection System, 7th European Symposium on Research in Computer Security, 2002.
DOI : 10.1007/3-540-45853-0_16

A. Kamra, E. Bertino, and E. Terzi, Detecting anomalous access patterns in relational databases, The VLDB Journal, vol.2, issue.3, pp.1063-1077, 2008.
DOI : 10.1007/s00778-007-0051-4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.4302

Y. Hu and B. Panda, Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems, Journal of Network and Systems Management, vol.13, issue.6, pp.111-125, 2005.
DOI : 10.1007/s10922-005-6264-1

W. Lee and S. J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, issue.4, pp.227-261, 2000.
DOI : 10.1145/382912.382914

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.4003

Y. Meng, P. Liu, and W. Zang, Multi-version attack recovery for workflow systems, 19th Annual Computer Security Applications Conference, 2003. Proceedings., 2003.
DOI : 10.1109/CSAC.2003.1254319

A. Srivastava, S. Surai, and A. K. Majumbar, Weighted Intra Transaction Rules Mining for Database Intrusion Detection, Proceedings of the Pacific-Asia Knowledge Discovery and Data Mining, 2006.
DOI : 10.1007/11731139_71

I. Ray and N. Poolsappasit, Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, Proceedings of the 10 th European Symposium on Research in Computer Security, 2005.
DOI : 10.1007/11555827_14

I. Martinez-moyano, E. Rich, S. Conrad, D. F. Anderson, and T. R. Stewart, A behavioral theory of insider-threat risks, ACM Transactions on Modeling and Computer Simulation, vol.18, issue.2, 2008.
DOI : 10.1145/1346325.1346328

Q. Yaseen and B. Panda, Predicting and Preventing Insider Threat in Relational Database Systems, 4th Workshop in Information Security Theory and Practice, 2010.
DOI : 10.1109/5.24143

URL : https://hal.archives-ouvertes.fr/hal-01056069

Q. Yaseen and B. Panda, Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention, 2010 IEEE Second International Conference on Social Computing, 2010.
DOI : 10.1109/SocialCom.2010.128

A. Newman, Database Activity Monitoring: Intrusion Detection & Security Auditing, DAM Whitepaper

R. Mogull, Understanding and Selecting a Database Activity Monitoring Solution