{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:14:25Z","timestamp":1725491665968},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752936"},{"type":"electronic","value":"9783540752943"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75294-3_15","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T14:52:08Z","timestamp":1189522328000},"page":"198-211","source":"Crossref","is-referenced-by-count":10,"title":["Integrated Intrusion Detection in Databases"],"prefix":"10.1007","author":[{"given":"Jos\u00e9","family":"Fonseca","sequence":"first","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Date, C.J., Darwen, H.: The SQL Standard, 3rd Edition, Addison-Wesley Publishing Company, pages 414, paperbound (1993), ISBN 0-201-55822-X"},{"key":"15_CR2","unstructured":"Conry-Murray, A.: The Threat From Within (2005), \n                    \n                      http:\/\/www.itarchitect.com\/shared\/article\/showArticle.jhtml?articleId=166400792"},{"key":"15_CR3","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: Computer Security Institute. Computer crime and security survey (2005)"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science\u00a016(1), 58\u201374 (2001)","journal-title":"Statistical Science"},{"key":"15_CR5","unstructured":"Surf, M., Shulman, A.: How safe is it out there? Zeroing in on the vulnerabilities of application security, Imperva Application Defense Center Paper (2004)"},{"key":"15_CR6","unstructured":"Anton, A., Bertino, E., Li, N., Yu, T.: A roadmap for comprehensive online privacy policies. In: CERIAS Technical Report, 2004-47 (2004)"},{"key":"15_CR7","series-title":"Proceedings of the 28th international conference on Very Large Data Bases","volume-title":"Hippocratic databases","author":"R. Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. Proceedings of the 28th international conference on Very Large Data Bases. Morgan-Kaufmann, San Francisco (2002)"},{"key":"15_CR8","first-page":"159","volume-title":"3rd IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information System","author":"C.Y. Chung","year":"1999","unstructured":"Chung, C.Y., Gertz, M., Levitt, K.: DEMIDS: A Misuse Detection System for Database Systems. In: 3rd IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information System, pp. 159\u2013178. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion detection in RBAC-administered databases. In: 21st Annual Computer Security Applications Conference (2005)","DOI":"10.1109\/CSAC.2005.33"},{"key":"15_CR10","unstructured":"Liu, P.: DAIS: A Real-time Data Attack Isolation System for Commercial Database Applications. In: Proc. of the 17th Annual Comp. Security Applications Conf. (2001)"},{"key":"15_CR11","unstructured":"Hu, Y., Panda, B.: Identification of malicious transactions in database systems. In: The International Database Engineering and Applications Symposium (2003)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Lee, S.Y., Low, W.L., Wong, P.Y.: Learning Fingerprints for a Database Intrusion Detection System. In: 7th European Symp. on Research in Computer Security (2002)","DOI":"10.1007\/3-540-45853-0_16"},{"key":"15_CR13","volume-title":"The 11th IEEE Intl. Symposium Pacific Rim Dependable Computing","author":"M. Vieira","year":"2005","unstructured":"Vieira, M., Madeira, H.: Detection of malicious transactions in DBMS. In: The 11th IEEE Intl. Symposium Pacific Rim Dependable Computing, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"15_CR14","unstructured":"Fonseca, J., Vieira, M., Madeira, H.: Tool for Integrated Intrusion Detection in Databases (2007), available at: \n                    \n                      http:\/\/gbd.dei.uc.pt\/downloads.php"},{"volume-title":"The Data Warehouse Lifecycle Toolkit","year":"1998","key":"15_CR15","unstructured":"Kimball, R. (ed.): The Data Warehouse Lifecycle Toolkit. Wiley & Sons, Inc., Chichester (1998)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Santiago, V., Amaral, A., Vijaykumar, N.L., Mattiello-Francisco, M., Martins, E., Lopes, O.: A Practical Approach for Automated Test Case Generation using Statecharts. In: 30th Annual International Computer Software and Applications Conference, 2006, Chicago (2006)","DOI":"10.1109\/COMPSAC.2006.100"},{"key":"15_CR17","unstructured":"Tsai, W.T., Bai, X., Huang, B., Devaraj, G., Paul, R.: Automatic Test Case Generation for GUI Navigation. In: The Thirteenth International Software & Internet Quality Week (2000)"},{"key":"15_CR18","unstructured":"Oracle Corporation, Oracle\u00ae Database Concepts 10g Release 1 (10.1) (2003)"},{"key":"15_CR19","unstructured":"Transaction Processing Performance Council, TPC Benchmark W (Web Commerce) Specification, Revision 1.8 (2002), available at: \n                    \n                      http:\/\/www.tpc.org\/tpcw"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75294-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:59:06Z","timestamp":1619521146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75294-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540752936","9783540752943"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75294-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}