{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T16:23:31Z","timestamp":1779294211305,"version":"3.51.4"},"reference-count":22,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2026,4]]},"abstract":"<jats:p>As databases serve as critical infrastructure in modern information systems, ensuring their security has become increasingly important. Traditional risk assessment and anomaly detection methods often struggle with limited adaptability to dynamic threats, high false positive rates, and suboptimal real-time performance. This study proposes a novel machine learning framework for dynamic risk assessment and anomaly detection in database security. The framework integrates supervised and unsupervised learning algorithms to create an adaptive evaluation model capable of identifying abnormal behaviors and emerging threats with greater precision and efficiency \u2014 distinguishing itself from existing approaches. Compared with the RADS real-time anomaly detection model [M. Sneha, K. A. Keerthan, N. V. Hegde, A. A. Anish and G. Shobha, RADS: A real-time anomaly detection model for software-defined networks using machine learning, Int. J. Inf. Secur.\u00a022(6) (2023) 1881\u20131891], which focuses on real-time monitoring of software-defined network traffic and relies primarily on unsupervised learning for anomaly identification, our framework adopts a supervised-unsupervised learning fusion logic: supervised models (e.g. optimized SVM, Random Forest) are used to learn known attack patterns from labeled data, while unsupervised models (e.g. enhanced K-Means, DBSCAN) capture unknown anomalies from unlabeled data. The two types of models are dynamically weighted based on data uncertainty (e.g. higher weights for supervised models when labeled data confidence is high, and vice versa), addressing RADS\u2019 limitation of over-reliance on unsupervised learning and poor generalization to known threats. Experimental results demonstrate that the proposed model significantly outperforms traditional methods in terms of accuracy, recall, and computational efficiency. This research not only contributes a scalable and intelligent approach to database security but also offers practical applications in high-risk domains such as finance and cybersecurity.<\/jats:p>","DOI":"10.1142\/s0218001425520391","type":"journal-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T05:57:52Z","timestamp":1765346272000},"source":"Crossref","is-referenced-by-count":1,"title":["A Machine Learning Framework for Dynamic Risk Assessment and Anomaly Detection in Database Security"],"prefix":"10.1142","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6452-712X","authenticated-orcid":false,"given":"Qiming","family":"Xu","sequence":"first","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, 440, Huntington Avenue, Boston, MA 02115, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Le","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093-0404, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5022-3949","authenticated-orcid":false,"given":"Yikan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ 07030, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6464-6507","authenticated-orcid":false,"given":"Yingqiao","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Engineering, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"219","published-online":{"date-parts":[[2026,1,23]]},"reference":[{"key":"S0218001425520391BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2924870"},{"key":"S0218001425520391BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04303-y"},{"key":"S0218001425520391BIB003","doi-asserted-by":"crossref","unstructured":"D. Dasgupta and D. Ferebee, Enhancing computer security with smart technology,\n                      IEEE Comput. Intell. Mag.\n                      3\n                      (2) (2008) 70\u201371.","DOI":"10.1109\/MCI.2008.919083"},{"key":"S0218001425520391BIB004","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6639714"},{"key":"S0218001425520391BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2021.01.113"},{"issue":"2","key":"S0218001425520391BIB006","first-page":"336","volume":"45","author":"Huang S.","year":"2023","journal-title":"Chin. J. Geotech. Eng."},{"key":"S0218001425520391BIB007","doi-asserted-by":"publisher","DOI":"10.1002\/adfm.202423566"},{"key":"S0218001425520391BIB008","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.2281"},{"key":"S0218001425520391BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.009"},{"key":"S0218001425520391BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00923-y"},{"key":"S0218001425520391BIB011","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021830128811"},{"key":"S0218001425520391BIB012","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00328-z"},{"key":"S0218001425520391BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00134-1"},{"key":"S0218001425520391BIB014","doi-asserted-by":"publisher","DOI":"10.1137\/140957639"},{"key":"S0218001425520391BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08601-1"},{"key":"S0218001425520391BIB016","doi-asserted-by":"publisher","DOI":"10.3390\/app14167162"},{"key":"S0218001425520391BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-03027-8"},{"key":"S0218001425520391BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11602-5"},{"key":"S0218001425520391BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01694-y"},{"key":"S0218001425520391BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00724-9"},{"key":"S0218001425520391BIB021","doi-asserted-by":"publisher","DOI":"10.36244\/ICJ.2021.1.5"},{"key":"S0218001425520391BIB022","doi-asserted-by":"publisher","DOI":"10.3390\/app15137597"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001425520391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:23:01Z","timestamp":1772788981000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001425520391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,23]]},"references-count":22,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["10.1142\/S0218001425520391"],"URL":"https:\/\/doi.org\/10.1142\/s0218001425520391","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"value":"0218-0014","type":"print"},{"value":"1793-6381","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,23]]},"article-number":"2552039"}}