Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
Authors
Keywords
-
Journal
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2022-06-01
DOI
10.1007/s10586-022-03622-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model
- (2021) Ali Akbar Movassagh et al. Journal of Ambient Intelligence and Humanized Computing
- Hybrid WGWO: whale grey wolf optimization-based novel energy-efficient clustering for EH-WSNs
- (2020) Rajkumar Singh Rathore et al. EURASIP Journal on Wireless Communications and Networking
- Paraphrase identification using collaborative adversarial networks
- (2020) Jafar A. Alzubi et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- An improved artificial bee colony algorithm based on whale optimization algorithm for data clustering
- (2020) Nouria Rahnema et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Deep image captioning using an ensemble of CNN and LSTM based deep neural networks
- (2020) Jafar A. Alzubi et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Clustering analysis using a novel locality-informed grey wolf-inspired clustering approach
- (2019) Ibrahim Aljarah et al. KNOWLEDGE AND INFORMATION SYSTEMS
- A hybrid gray wolf and genetic whale optimization algorithm for efficient moving object analysis
- (2019) T. Mahalingam et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A convolutional neural-based learning classifier system for detecting database intrusion via insider attack
- (2019) Seok-Jun Bu et al. INFORMATION SCIENCES
- A flexible data acquisition system for storing the interactions on mashup user interfaces
- (2018) Antonio Jesús Fernández-García et al. COMPUTER STANDARDS & INTERFACES
- Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study
- (2018) Davy Preuveneers et al. Applied Sciences-Basel
- Mining weighted frequent sequences in uncertain databases
- (2018) Md Mahmudur Rahman et al. INFORMATION SCIENCES
- DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts
- (2017) Asmaa Sallam et al. IEEE Systems Journal
- The Whale Optimization Algorithm
- (2016) Seyedali Mirjalili et al. ADVANCES IN ENGINEERING SOFTWARE
- Anomalous query access detection in RBAC-administered databases with random forest and PCA
- (2016) Charissa Ann Ronao et al. INFORMATION SCIENCES
- An efficient approach for finding weighted sequential patterns from sequence databases
- (2014) Guo-Cheng Lan et al. APPLIED INTELLIGENCE
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
- (2010) Sattar Hashemi et al. EXPERT SYSTEMS
- Two-stage database intrusion detection by combining multiple evidence and belief update
- (2010) Suvasini Panigrahi et al. INFORMATION SYSTEMS FRONTIERS
- Database intrusion detection using sequence alignment
- (2010) Amlan Kundu et al. International Journal of Information Security
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started