Customized Intrusion Detection Based on a Database Audit Log

Thomas Le, William Mitchell, Behnam S. Arad. Customized Intrusion Detection Based on a Database Audit Log. In Gordon Lee, Ying Jin 0001, editors, Proceedings of 34th International Conference on Computers and Their Applications, CATA 2019, Honolulu, Hawaii, USA, March 18-20, 2019. Volume 58 of EPiC Series in Computing, pages 117-126, EasyChair, 2019. [doi]

@inproceedings{LeMA19,
  title = {Customized Intrusion Detection Based on a Database Audit Log},
  author = {Thomas Le and William Mitchell and Behnam S. Arad},
  year = {2019},
  url = {https://easychair.org/publications/paper/JMgP},
  researchr = {https://researchr.org/publication/LeMA19},
  cites = {0},
  citedby = {0},
  pages = {117-126},
  booktitle = {Proceedings of 34th International Conference on Computers and Their Applications, CATA 2019, Honolulu, Hawaii, USA, March 18-20, 2019},
  editor = {Gordon Lee and Ying Jin 0001},
  volume = {58},
  series = {EPiC Series in Computing},
  publisher = {EasyChair},
}