Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Fundamentals of database systems (2nd ed.)
Fundamentals of database systems (2nd ed.)
A survey of intrusion detection techniques
Computers and Security
Communications of the ACM
A cop on the beat: collecting and appraising intrusion evidence
Communications of the ACM
Testing and evaluating computer intrusion detection systems
Communications of the ACM
Communications of the ACM
An overview of post information warfare data recovery
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Reconstructing the Database after Electronic Attacks
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Extended data dependency approach: a robust way of rebuilding database
Proceedings of the 2002 ACM symposium on Applied computing
Hybrid log segmentation for assured damage assessment
Proceedings of the 2003 ACM symposium on Applied computing
Data Dependency Based Recovery Approaches in Survival Database Systems
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |