{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:33:32Z","timestamp":1725705212971},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642350627"},{"type":"electronic","value":"9783642350634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35063-4_53","type":"book-chapter","created":{"date-parts":[[2012,11,6]],"date-time":"2012-11-06T20:36:15Z","timestamp":1352234175000},"page":"681-688","source":"Crossref","is-referenced-by-count":3,"title":["Securing Data Warehouses from Web-Based Intrusions"],"prefix":"10.1007","author":[{"given":"Ricardo Jorge","family":"Santos","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"Deolinda M. L.","family":"Rasteiro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Fonseca, J., Vieira, M., Madeira, H.: Online Detection of Malicious Data Access Using DBMS Auditing. In: ACM Symposium on Applied Computing, SAC (2008)","DOI":"10.1145\/1363686.1363921"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Hu, Y., Panda, B.: A Data Mining Approach for Database Intrusion Detection. In: ACM Symposium on Applied Computing, SAC (2004)","DOI":"10.1145\/967900.968048"},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Kamra, A., Terzi, E., Bertino, E.: Detecting Anomalous Access Pat-terns in Relational Databases. Springer VLDB Journal\u00a017 (2008)","DOI":"10.1007\/s00778-007-0051-4"},{"key":"53_CR4","unstructured":"Kimball, R., Ross, M.: The Data Warehouse Toolkit, 2nd edn. Wiley & Sons, Inc. (2002)"},{"key":"53_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/3-540-45853-0_16","volume-title":"Computer Security - ESORICS 2002","author":"S.-Y. Lee","year":"2002","unstructured":"Lee, S.-Y., Low, W.L., Wong, P.Y.: Learning Fingerprints for a Database Intrusion Detection System. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 264\u2013279. Springer, Heidelberg (2002)"},{"key":"53_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-15512-3_20","volume-title":"Recent Advances in Intrusion Detection","author":"S. Mathew","year":"2010","unstructured":"Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A Data-Centric Approach to Insider Attack Detection in Database Systems. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 382\u2013401. Springer, Heidelberg (2010)"},{"key":"53_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-540-30143-1_6","volume-title":"Recent Advances in Intrusion Detection","author":"T. Pietraszek","year":"2004","unstructured":"Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 102\u2013124. Springer, Heidelberg (2004)"},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Srivastava, A., Sural, S., Majumdar, A.K.: Database Intrusion De-tection using Weighted Sequence Mining. Journal of Computers\u00a0I(4) (2006)","DOI":"10.4304\/jcp.1.4.8-17"},{"key":"53_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11856214_1","volume-title":"Recent Advances in Intrusion Detection","author":"J.J. Treinen","year":"2006","unstructured":"Treinen, J.J., Thurimella, R.: A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 1\u201318. Springer, Heidelberg (2006)"},{"key":"53_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2001","unstructured":"Valdes, A., Skinner, K.: Probabilistic Alert Correlation. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 54\u201368. Springer, Heidelberg (2001)"},{"key":"53_CR11","unstructured":"Transaction Processing Council, TPC Decision Support Benchmark H, \n                    \n                      http:\/\/www.tpc.org\/tpch"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering - WISE 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35063-4_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T14:55:45Z","timestamp":1557327345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35063-4_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642350627","9783642350634"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35063-4_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}