| 2008 |
| 7 | EE | Ashish Kamra,
Elisa Bertino:
Database Intrusion Detection and Response.
RAID 2008: 400-401 |
| 6 | EE | Ashish Kamra,
Elisa Bertino,
Rimma V. Nehme:
Responding to Anomalous Database Requests.
Secure Data Management 2008: 50-66 |
| 5 | EE | Ashish Kamra,
Evimaria Terzi,
Elisa Bertino:
Detecting anomalous access patterns in relational databases.
VLDB J. 17(5): 1063-1077 (2008) |
| 2007 |
| 4 | EE | Ji-Won Byun,
Ashish Kamra,
Elisa Bertino,
Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques.
DASFAA 2007: 188-200 |
| 3 | EE | Elisa Bertino,
Ashish Kamra,
James P. Early:
Profiling Database Application to Detect SQL Injection Attacks.
IPCCC 2007: 449-458 |
| 2005 |
| 2 | EE | Elisa Bertino,
Ashish Kamra,
Evimaria Terzi,
Athena Vakali:
Intrusion Detection in RBAC-administered Databases.
ACSAC 2005: 170-182 |
| 1 | EE | Mercan Topkara,
Ashish Kamra,
Mikhail J. Atallah,
Cristina Nita-Rotaru:
ViWiD : Visible Watermarking Based Defense Against Phishing.
IWDW 2005: 470-483 |