Computer Science ›› 2007, Vol. 34 ›› Issue (1): 123-127.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: There are limitations on the traditional user identification and access control of database security mechanism, such as in preventing the illegal actions of SQL injection, misusing authorization. However, most of existed intrusion detection researches foc

Key words: Clustering algorithm, Database security, Anomaly detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!