Privacy Interpretation of Behaviour-based Anomaly Detection Approaches.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Proceedings of the Emerging Information Security and Applications, 2021
On the detection of privacy and security anomalies.
PhD thesis, 2020
Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework.
Frontiers Big Data, 2020
Privacy Interpretation of Behavioural-based Anomaly Detection Approaches.
CoRR, 2020
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
CoRR, 2020
Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017
A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems.
Proceedings of the Risks and Security of Internet and Systems, 2017
Detecting Anomalous Behavior in DBMS Logs.
Proceedings of the Risks and Security of Internet and Systems, 2016
A joint watermarking and encryption scheme for DCT based codecs.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011
On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images.
Proceedings of the Signal Processing and Multimedia, 2010