{"id":"https://openalex.org/W4206816327","doi":"https://doi.org/10.1007/978-3-030-93956-4_11","title":"Database Intrusion Detection Systems (DIDs): Insider Threat Detection via\u00a0Behaviour-Based Anomaly Detection Systems - A\u00a0Brief Survey of\u00a0Concepts and\u00a0Approaches","display_name":"Database Intrusion Detection Systems (DIDs): Insider Threat Detection via\u00a0Behaviour-Based Anomaly Detection Systems - A\u00a0Brief Survey of\u00a0Concepts and\u00a0Approaches","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4206816327","doi":"https://doi.org/10.1007/978-3-030-93956-4_11"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-93956-4_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-93956-4_11","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055049490","display_name":"Muhammad Imran Khan","orcid":"https://orcid.org/0000-0003-4777-5084"},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Muhammad Imran Khan","raw_affiliation_strings":["Insight Centre for Data Analytics, School of Computer Science and Information Technology, University College Cork, Cork, Ireland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Insight Centre for Data Analytics, School of Computer Science and Information Technology, University College Cork, Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032696897","display_name":"Simon N. Foley","orcid":"https://orcid.org/0000-0002-0183-1215"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Simon N. Foley","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gj\u00f8vik, Norway"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033998859","display_name":"Barry O\u2019Sullivan","orcid":"https://orcid.org/0000-0002-0090-2085"},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Barry O\u2019Sullivan","raw_affiliation_strings":["Insight Centre for Data Analytics, School of Computer Science and Information Technology, University College Cork, Cork, Ireland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Insight Centre for Data Analytics, School of Computer Science and Information Technology, University College Cork, Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055049490"],"corresponding_institution_ids":["https://openalex.org/I27577105"],"apc_list":null,"apc_paid":null,"fwci":4.3056,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.94374269,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"197"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.8967108726501465},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.8708269596099854},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.711163341999054},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6979280710220337},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.679474949836731},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5051165223121643},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.43916356563568115},{"id":"https://openalex.org/keywords/misuse-detection","display_name":"Misuse detection","score":0.43767446279525757},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34190988540649414},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06747952103614807},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06178915500640869}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.8967108726501465},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.8708269596099854},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.711163341999054},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6979280710220337},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.679474949836731},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5051165223121643},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.43916356563568115},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.43767446279525757},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34190988540649414},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06747952103614807},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06178915500640869},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-93956-4_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-93956-4_11","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W54380957","https://openalex.org/W1481547447","https://openalex.org/W1497959280","https://openalex.org/W1520397516","https://openalex.org/W1528510850","https://openalex.org/W1566970108","https://openalex.org/W1913306154","https://openalex.org/W1941427975","https://openalex.org/W1965630947","https://openalex.org/W1969795119","https://openalex.org/W1989359075","https://openalex.org/W1990649188","https://openalex.org/W2009489720","https://openalex.org/W2011778831","https://openalex.org/W2021702566","https://openalex.org/W2031175798","https://openalex.org/W2036358294","https://openalex.org/W2041700825","https://openalex.org/W2050206309","https://openalex.org/W2089303860","https://openalex.org/W2104993088","https://openalex.org/W2111724279","https://openalex.org/W2130523241","https://openalex.org/W2135143063","https://openalex.org/W2142889610","https://openalex.org/W2145332315","https://openalex.org/W2145722235","https://openalex.org/W2147882403","https://openalex.org/W2148342514","https://openalex.org/W2157196931","https://openalex.org/W2160319865","https://openalex.org/W2163345053","https://openalex.org/W2165313080","https://openalex.org/W2166311720","https://openalex.org/W2167240430","https://openalex.org/W2291034565","https://openalex.org/W2296669295","https://openalex.org/W2344901352","https://openalex.org/W2508283490","https://openalex.org/W2525015842","https://openalex.org/W2593412302","https://openalex.org/W2801426799","https://openalex.org/W2810913013","https://openalex.org/W2913213946","https://openalex.org/W2998574808","https://openalex.org/W4231498119","https://openalex.org/W4248380232","https://openalex.org/W6632999242"],"related_works":["https://openalex.org/W2106474518","https://openalex.org/W2369534771","https://openalex.org/W3036013726","https://openalex.org/W2337148208","https://openalex.org/W2107592864","https://openalex.org/W1724519426","https://openalex.org/W1563027355","https://openalex.org/W2385236352","https://openalex.org/W1548126107","https://openalex.org/W2001107211"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
