{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:03:20Z","timestamp":1743019400865,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_43","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"460-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network"],"prefix":"10.1007","author":[{"given":"Gwang-Myong","family":"Go","sequence":"first","affiliation":[]},{"given":"Seok-Jun","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.J.: A data-centric approach to insider attack detection in database systems. In: Research in Arracks, Intrusions and Defenses, pp. 382\u2013401 (2010)","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"43_CR2","first-page":"44","volume":"9","author":"MC Murray","year":"2010","unstructured":"Murray, M.C.: Database security: what students need to know. J. Inf. Technol. Educ. Innov. Pract. 9, 44\u201361 (2010)","journal-title":"J. Inf. Technol. Educ. Innov. Pract."},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Jin, X., Osborn, S.L.: Architecture for data collection in database intrusion detection systems. In: Workshop on Secure Data Management, pp. 96\u2013107 (2007)","DOI":"10.1007\/978-3-540-75248-6_7"},{"key":"43_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"E Bertino","year":"2005","unstructured":"Bertino, E., Sandhu, R.: Database security: concepts, approaches and challenges. IEEE Trans. Dependable Secure Comput. 2, 2\u201319 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"43_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, K.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"43_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ins.2019.09.055","volume":"512","author":"S-J Bu","year":"2019","unstructured":"Bu, S.-J., Cho, S.-B.: A convolutional neural-based learning classifier system for detecting database intrusion via insider attack. Inf. Sci. 512, 123\u2013136 (2019)","journal-title":"Inf. Sci."},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Lee, S.Y., Low, W.L., Wong, P.Y.: Learning fingerprints for a database intrusion detection system. In: European Symposium on Research in Computer Security, pp. 264\u2013279 (2002)","DOI":"10.1007\/3-540-45853-0_16"},{"key":"43_CR8","unstructured":"Bertino, E., Terzi, E., Kamra, A., Vakali, A.: Intrusion detection in RBAC-administered databases. In: Computer Security Applications Conference, pp. 10\u201320 (2005)"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Hu, Y., Panda, B.: A data mining approach for database intrusion detection. In: ACM Symposium on Applied Computing, pp. 711\u2013716 (2004)","DOI":"10.1145\/967900.968048"},{"key":"43_CR10","unstructured":"Transaction Process Performance Council (TPC), TPC Benchmark E, Standard Specification Ver. 1.0 (2014)"},{"key":"43_CR11","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.ins.2016.06.038","volume":"369","author":"CA Ronao","year":"2016","unstructured":"Ronao, C.A., Cho, S.-B.: Anomalous query access detection in RBAC-administered database with random forest and PCA. Inf. Sci. 369, 238\u2013250 (2016)","journal-title":"Inf. Sci."},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Barbara, D., Goel, R., Jajodia, S.: Mining malicious corruption of data with hidden Markov models. In: Research Directions in Data and Applications Security, pp. 175\u2013189 (2003)","DOI":"10.1007\/978-0-387-35697-6_14"},{"key":"43_CR13","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/s00500-005-0513-9","volume":"10","author":"P Ramasubramanian","year":"2006","unstructured":"Ramasubramanian, P., Kannan, A.: A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Soft. Comput. 10, 699\u2013714 (2006)","journal-title":"Soft. Comput."},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 123\u2013140 (2005)","DOI":"10.1007\/11506881_8"},{"key":"43_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2011.06.020","volume":"231","author":"C Pinzon","year":"2013","unstructured":"Pinzon, C., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J., Corchado, J.M.: idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci. 231, 15\u201331 (2013)","journal-title":"Inf. Sci."},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Pinzon, C., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J.: A distributed hierarchical multi-agent architecture for detecting injections in SQL queries. In: Computational Intelligence in Security for Information Systems, pp. 51\u201359 (2010)","DOI":"10.1007\/978-3-642-16626-6_6"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Kamra, A., Ber, E.: Survey of machine learning methods for database security. In: Machine Learning in Cyber Trust, pp. 53\u201371 (2009)","DOI":"10.1007\/978-0-387-88735-7_3"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Ronao, C.A., Cho, S.-B.: Mining SQL queries to detect anomalous database access using random forest and PCA. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 151\u2013160 (2015)","DOI":"10.1007\/978-3-319-19066-2_15"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:14:37Z","timestamp":1599477277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}