{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:10:32Z","timestamp":1746115832131,"version":"3.40.4"},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781461475392"},{"type":"electronic","value":"9781461475408"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-7540-8_38","type":"book-chapter","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T17:41:31Z","timestamp":1383759691000},"page":"493-507","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DBMS Application Layer Intrusion Detection for Data Warehouses"],"prefix":"10.1007","author":[{"given":"Ricardo Jorge","family":"Santos","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,17]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Bockermann C, Apel M, Meier M (2009) Learning sql for database intrusion detection using context-sensitive modelling. In: Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 196\u2013205). Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-02918-9_12"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Fonseca J, Vieira M, Madeira H (2008, March). Online detection of malicious data access using DBMS auditing. In: Proceedings of the 2008 ACM symposium on Applied computing (pp. 1013\u20131020). ACM","DOI":"10.1145\/1363686.1363921"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Hu Y, Panda B (2004, March). A data mining approach for database intrusion detection. In: Proceedings of the 2004 ACM symposium on Applied computing (pp. 711\u2013716). ACM","DOI":"10.1145\/967900.968048"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Jin X, Osborn SL (2007) Architecture for data collection in database intrusion detection systems. In: Secure data management (pp. 96\u2013107). Springer Berlin Heidelberg","DOI":"10.1007\/978-3-540-75248-6_7"},{"issue":"5","key":"38_CR5","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","volume":"17","author":"A Kamra","year":"2008","unstructured":"Kamra A, Terzi E, Bertino E (2008) Detecting anomalous access patterns in relational databases. Springer VLDB J 17(5):1063\u20131077","journal-title":"Springer VLDB J"},{"key":"38_CR6","volume-title":"The data warehouse toolkit","author":"R Kimball","year":"2002","unstructured":"Kimball R, Ross M (2002) The data warehouse toolkit, 2nd edn. Wiley, New York","edition":"2"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Kundu A, Sural S, Majumdar AK (2010) Database intrusion detection using sequence alignment. Int J Inform Secur (9), 2010","DOI":"10.1007\/s10207-010-0102-5"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Lee SY, Low WL, Wong PY (2002) Learning fingerprints for a database intrusion detection system. In: Computer Security\u2014ESORICS 2002 (pp. 264\u2013279). Springer Berlin Heidelberg","DOI":"10.1007\/3-540-45853-0_16"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Lee VC, Stankovic JA, Son SH (2000) Intrusion detection in real-time database systems via time signatures. In: Real-Time Technology and Applications Symposium, 2000. RTAS 2000. Proceedings. Sixth IEEE (pp. 124\u2013133). IEEE","DOI":"10.1109\/RTTAS.2000.852457"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Mathew S, Petropoulos M, Ngo HQ, Upadhyaya S (2010, January). A data-centric approach to insider attack detection in database systems. In: Recent Advances in Intrusion Detection (pp. 382\u2013401). Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"38_CR11","unstructured":"Newman AC (2011) Intrusion detection and security auditing in Oracle. Application Security Inc. White paper"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Pietraszek T (2004, January). Using adaptive alert classification to reduce false positives in intrusion detection. In Recent Advances in Intrusion Detection (pp. 102\u2013124). Springer Berlin Heidelberg","DOI":"10.1007\/978-3-540-30143-1_6"},{"issue":"3","key":"38_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.istr.2005.07.001","volume":"10","author":"T Pietraszek","year":"2005","unstructured":"Pietraszek T, Tanner A (2005) Data mining and machine learning \u2013 towards reducing false positives in intrusion detection. Inform Secur Tech Rep 10(3):169\u2013183","journal-title":"Inform Secur Tech Rep"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Rao UP, Sahani GJ, Patel DR (2010) Clustering based machine learning approach for detecting intrusions in RBAC enabled databases. IJCNS 2(6)","DOI":"10.1109\/ICCCNT.2010.5591574"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Spalka A, Lehnhardt J (2005) A comprehensive approach to anomaly detection in relational databases. In: Data and Applications Security XIX (pp. 207\u2013221). Springer Berlin Heidelberg","DOI":"10.1007\/11535706_16"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Srivastava A, Sural S, Majumdar AK (2006) Database intrusion detection using weighted sequence mining. J Computer 1(4)","DOI":"10.4304\/jcp.1.4.8-17"},{"key":"38_CR17","unstructured":"Transaction Processing Council. Decision support benchmark TPC-H, www.tpc.org\/tpch"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Treinen JJ, Thurimella R (2006, January). A framework for the application of association rule mining in large intrusion detection infrastructures. In: Recent Advances in Intrusion Detection (pp. 1\u201318). Springer Berlin Heidelberg","DOI":"10.1007\/11856214_1"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Yu Z, Tsai JP, Weigert T (2007) An automatically tuning intrusion detection system. IEEE T Syst Man Cy 37(2)","DOI":"10.1109\/TSMCB.2006.885306"}],"container-title":["Building Sustainable Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7540-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T19:42:44Z","timestamp":1746042164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7540-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9781461475392","9781461475408"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7540-8_38","relation":{},"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"17 October 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}