The following publications are possibly variants of this publication:
- Mitigating Malicious Updates: Prevention of Insider Threat to DatabasesHarini Ragavan, Brajendra Panda. trustcom 2013: 781-788 [doi]
- Malicious Modification Attacks by Insiders in Relational Databases: Prediction and PreventionQussai Yaseen, Brajendra Panda. socialcom 2010: 849-856 [doi]
- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious InsidersJonathan White, Brajendra Panda. iciss 2009: 208-221 [doi]
- Mitigating Insider Threat on Database IntegrityWeihan Li, Brajendra Panda, Qussai Yaseen. iciss 2012: 223-237 [doi]
- Mitigating insider threat in cloud relational databasesQussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh. scn, 9(10):1132-1145, 2016. [doi]
- Insider Threat in Database Systems: Preventing Malicious Users Activities in DatabasesManideep Chagarlamudi, Brajendra Panda, Yi Hu. itng 2009: 1616-1620 [doi]