{"id":"https://openalex.org/W4417181644","doi":"https://doi.org/10.1142/s0218001425520391","title":"A Machine Learning Framework for Dynamic Risk Assessment and Anomaly Detection in Database Security","display_name":"A Machine Learning Framework for Dynamic Risk Assessment and Anomaly Detection in Database Security","publication_year":2025,"publication_date":"2025-12-10","ids":{"openalex":"https://openalex.org/W4417181644","doi":"https://doi.org/10.1142/s0218001425520391"},"language":"en","primary_location":{"id":"doi:10.1142/s0218001425520391","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218001425520391","pdf_url":null,"source":{"id":"https://openalex.org/S41486457","display_name":"International Journal of Pattern Recognition and Artificial Intelligence","issn_l":"0218-0014","issn":["0218-0014","1793-6381"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pattern Recognition and Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qiming Xu","orcid":"https://orcid.org/0009-0002-6452-712X"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qiming Xu","raw_affiliation_strings":["Khoury College of Computer Sciences, Northeastern University, 440, Huntington Avenue, Boston, MA 02115, USA"],"raw_orcid":"https://orcid.org/0009-0002-6452-712X","affiliations":[{"raw_affiliation_string":"Khoury College of Computer Sciences, Northeastern University, 440, Huntington Avenue, Boston, MA 02115, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065469385","display_name":"Le Liu","orcid":"https://orcid.org/0009-0008-0471-3944"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Le Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093-0404, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093-0404, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089588735","display_name":"Yikan Wang","orcid":"https://orcid.org/0009-0007-5022-3949"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yikan Wang","raw_affiliation_strings":["School of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ 07030, USA"],"raw_orcid":"https://orcid.org/0009-0007-5022-3949","affiliations":[{"raw_affiliation_string":"School of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ 07030, USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038587802","display_name":"Yingqiao Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingqiao Zheng","raw_affiliation_strings":["College of Engineering, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA"],"raw_orcid":"https://orcid.org/0009-0006-6464-6507","affiliations":[{"raw_affiliation_string":"College of Engineering, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":1.2108,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86261915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"40","issue":"05","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5489000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5489000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.10429999977350235,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.08630000054836273,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8313000202178955},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.6693999767303467},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5702000260353088},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5166000127792358},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.5156999826431274},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.435699999332428},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4239000082015991},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4009999930858612}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8313000202178955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7671999931335449},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7512999773025513},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7113000154495239},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.6693999767303467},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5702000260353088},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5166000127792358},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.5156999826431274},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.435699999332428},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4239000082015991},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4009999930858612},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39579999446868896},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.36309999227523804},{"id":"https://openalex.org/C58973888","wikidata":"https://www.wikidata.org/wiki/Q1041418","display_name":"Semi-supervised learning","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C77967617","wikidata":"https://www.wikidata.org/wiki/Q4677561","display_name":"Active learning (machine learning)","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C2781002164","wikidata":"https://www.wikidata.org/wiki/Q6822311","display_name":"Meta learning (computer science)","level":3,"score":0.2572000026702881},{"id":"https://openalex.org/C34872919","wikidata":"https://www.wikidata.org/wiki/Q7092302","display_name":"One-class classification","level":3,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218001425520391","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218001425520391","pdf_url":null,"source":{"id":"https://openalex.org/S41486457","display_name":"International Journal of Pattern Recognition and Artificial Intelligence","issn_l":"0218-0014","issn":["0218-0014","1793-6381"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pattern Recognition and Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1977591411","https://openalex.org/W2056736956","https://openalex.org/W2092425835","https://openalex.org/W2110523863","https://openalex.org/W2120717492","https://openalex.org/W2167371646","https://openalex.org/W2962444737","https://openalex.org/W2996577765","https://openalex.org/W3138080548","https://openalex.org/W3138174669","https://openalex.org/W3157610766","https://openalex.org/W4298005735","https://openalex.org/W4368342560","https://openalex.org/W4383557224","https://openalex.org/W4392347653","https://openalex.org/W4398205405","https://openalex.org/W4401615170","https://openalex.org/W4403136739","https://openalex.org/W4404168731","https://openalex.org/W4407845611","https://openalex.org/W4412087406"],"related_works":[],"abstract_inverted_index":{"As":[0],"databases":[1],"serve":[2],"as":[3,270],"critical":[4],"infrastructure":[5],"in":[6,55,240,266],"modern":[7],"information":[8],"systems,":[9],"ensuring":[10],"their":[11],"security":[12,260],"has":[13],"become":[14],"increasingly":[15],"important.":[16],"Traditional":[17],"risk":[18,50],"assessment":[19,51],"and":[20,36,52,62,77,83,110,141,212,223,245,255,272],"anomaly":[21,53,96,116,148],"detection":[22,54,97,117],"methods":[23,239],"often":[24],"struggle":[25],"with":[26,80,92],"limited":[27],"adaptability":[28],"to":[29,66,167,226,258],"dynamic":[30,49],"threats,":[31],"high":[32],"false":[33],"positive":[34],"rates,":[35],"suboptimal":[37],"real-time":[38,95,115,135],"performance.":[39],"This":[40,248],"study":[41],"proposes":[42],"a":[43,153,253],"novel":[44],"machine":[45,123],"learning":[46,64,146,155,222],"framework":[47,59,151],"for":[48,119,147,203],"database":[56,259],"security.":[57],"The":[58,188],"integrates":[60],"supervised":[61,158,204],"unsupervised":[63,145,176,221],"algorithms":[65],"create":[67],"an":[68],"adaptive":[69],"evaluation":[70],"model":[71,98,118,235],"capable":[72],"of":[73,137,191,218,242],"identifying":[74],"abnormal":[75],"behaviors":[76],"emerging":[78],"threats":[79],"greater":[81],"precision":[82],"efficiency":[84],"\u2014":[85],"distinguishing":[86],"itself":[87],"from":[88,172,185],"existing":[89],"approaches.":[90],"Compared":[91],"the":[93,233],"RADS":[94],"[M.":[99],"Sneha,":[100],"K.":[101],"A.":[102,107,108],"Keerthan,":[103],"N.":[104],"V.":[105],"Hegde,":[106],"Anish":[109],"G.":[111],"Shobha,":[112],"RADS:":[113],"A":[114],"software-defined":[120,138],"networks":[121],"using":[122],"learning,":[124],"Int.":[125],"J.":[126],"Inf.":[127],"Secur.":[128],"22(6)":[129],"(2023)":[130],"1881\u20131891],":[131],"which":[132],"focuses":[133],"on":[134,144,197,220],"monitoring":[136],"network":[139],"traffic":[140],"relies":[142],"primarily":[143],"identification,":[149],"our":[150],"adopts":[152],"supervised-unsupervised":[154],"fusion":[156],"logic:":[157],"models":[159,177,192,205],"(e.g.":[160,178,200],"optimized":[161],"SVM,":[162],"Random":[163],"Forest)":[164],"are":[165,193],"used":[166],"learn":[168],"known":[169,227],"attack":[170],"patterns":[171],"labeled":[173,207],"data,":[174],"while":[175],"enhanced":[179],"K-Means,":[180],"DBSCAN)":[181],"capture":[182],"unknown":[183],"anomalies":[184],"unlabeled":[186],"data.":[187],"two":[189],"types":[190],"dynamically":[194],"weighted":[195],"based":[196],"data":[198,208],"uncertainty":[199],"higher":[201],"weights":[202],"when":[206],"confidence":[209],"is":[210],"high,":[211],"vice":[213],"versa),":[214],"addressing":[215],"RADS\u2019":[216],"limitation":[217],"over-reliance":[219],"poor":[224],"generalization":[225],"threats.":[228],"Experimental":[229],"results":[230],"demonstrate":[231],"that":[232],"proposed":[234],"significantly":[236],"outperforms":[237],"traditional":[238],"terms":[241],"accuracy,":[243],"recall,":[244],"computational":[246],"efficiency.":[247],"research":[249],"not":[250],"only":[251],"contributes":[252],"scalable":[254],"intelligent":[256],"approach":[257],"but":[261],"also":[262],"offers":[263],"practical":[264],"applications":[265],"high-risk":[267],"domains":[268],"such":[269],"finance":[271],"cybersecurity.":[273]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-12-10T00:00:00"}
