2008 |
7 | EE | Ashish Kamra,
Elisa Bertino:
Database Intrusion Detection and Response.
RAID 2008: 400-401 |
6 | EE | Ashish Kamra,
Elisa Bertino,
Rimma V. Nehme:
Responding to Anomalous Database Requests.
Secure Data Management 2008: 50-66 |
5 | EE | Ashish Kamra,
Evimaria Terzi,
Elisa Bertino:
Detecting anomalous access patterns in relational databases.
VLDB J. 17(5): 1063-1077 (2008) |
2007 |
4 | EE | Ji-Won Byun,
Ashish Kamra,
Elisa Bertino,
Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques.
DASFAA 2007: 188-200 |
3 | EE | Elisa Bertino,
Ashish Kamra,
James P. Early:
Profiling Database Application to Detect SQL Injection Attacks.
IPCCC 2007: 449-458 |
2005 |
2 | EE | Elisa Bertino,
Ashish Kamra,
Evimaria Terzi,
Athena Vakali:
Intrusion Detection in RBAC-administered Databases.
ACSAC 2005: 170-182 |
1 | EE | Mercan Topkara,
Ashish Kamra,
Mikhail J. Atallah,
Cristina Nita-Rotaru:
ViWiD : Visible Watermarking Based Defense Against Phishing.
IWDW 2005: 470-483 |