9Chung C Y, Gertz M, Levitt K. DEMIDS: a misuse detection system for database systems[C]//Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems. Amsterdam, Netherlands: Kluwer Academic Publishers, 1999:159 - 178.
10Vieira M,Madeira H. Detection of malicious transactions in DBMS[C]//Proceedings of the llth IEEE International Symposium Pacific Rim Dependable Computing. Washington, DC, USA: IEEE Computer Society, 2005:350-357.