{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:07:10Z","timestamp":1729652830984,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/cse.2009.159","type":"proceedings-article","created":{"date-parts":[[2009,10,12]],"date-time":"2009-10-12T15:50:02Z","timestamp":1255362602000},"page":"450-455","source":"Crossref","is-referenced-by-count":24,"title":["Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems"],"prefix":"10.1109","author":[{"given":"Qussai","family":"Yaseen","sequence":"first","affiliation":[]},{"given":"Brajendra","family":"Panda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381939"},{"key":"14","first-page":"350","article-title":"fuzzy dependency and its applications in damage assessment and recovery","author":"zuo","year":"2004","journal-title":"Proc 4th Annu IEEE Information Assurance Workshop"},{"journal-title":"Proceedings of the Twenty-First Annual Computer Security Applications Conference","article-title":"a layered approach to insider threat detection and proactive forensics","year":"2005","author":"bradford","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/38714.38752","article-title":"security and inference in multilevel database and knowledge-base systems","volume":"16","author":"morgenstern","year":"1987","journal-title":"ACM SIGMOD Record"},{"key":"3","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/772862.772864","article-title":"the inference problem: a survey","volume":"4","author":"farkas","year":"2002","journal-title":"ACM SIGKDD Explorations"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413158"},{"journal-title":"Proceedings of a March 2004 Workshop Technical Report","article-title":"understanding the insider threat","year":"2004","author":"brackney","key":"1"},{"journal-title":"Proceedings of the International Conference on Intelligent Analysis","article-title":"analysis and detection of malicious insiders","year":"2005","author":"maybury","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2005.94"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683168"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8101"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/69.895801"},{"key":"9","first-page":"202","article-title":"data dependencies and inference control in multilevel relational database systems","author":"su","year":"1987","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/69.109108"}],"event":{"name":"2009 International Conference on Computational Science and Engineering","start":{"date-parts":[[2009,8,29]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,8,31]]}},"container-title":["2009 International Conference on Computational Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5282954\/5282955\/05283156.pdf?arnumber=5283156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:35:31Z","timestamp":1497818131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5283156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cse.2009.159","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}