Computer Science ›› 2007, Vol. 34 ›› Issue (1): 123-127.
Previous Articles Next Articles
Online:
Published:
Abstract: There are limitations on the traditional user identification and access control of database security mechanism, such as in preventing the illegal actions of SQL injection, misusing authorization. However, most of existed intrusion detection researches foc
Key words: Clustering algorithm, Database security, Anomaly detection
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I1/123
Cited