Asmaa Sallam

According to our database1, Asmaa Sallam authored at least 14 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Result-Based Detection of Insider Threats to Relational Databases.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Techniques and Systems for Anomaly Detection in Database Systems.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Detection of Temporal Data Ex-Filtration Threats to Relational Databases.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts.
IEEE Syst. J., 2017

Detection of Temporal Insider Threats to Relational Databases.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

2016
Data and syntax centric anomaly detection for relational databases.
WIREs Data Mining Knowl. Discov., 2016

Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

PANDDE: Provenance-based ANomaly Detection of Data Exfiltration.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
DetAnom: Detecting Anomalous Database Transactions by Insiders.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Detecting mobile malware threats to homeland security through static analysis.
J. Netw. Comput. Appl., 2014

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PostgreSQL anomalous query detector.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
M3: Stream Processing on Main-Memory MapReduce.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012


  Loading...