Changqing Chen's research while affiliated with Huazhong University of Science and Technology and other places

Publications (3)

Chapter
In a real-time database, correctness of transaction depends not only on the correct implementation, but also depends on the effectiveness of time. Traditional database recovery strategies are adopted to undo all malicious transactions and affected transactions, and then redo the affected transactions. This time-consuming recovery process is not acc...
Conference Paper
With the application of real-time databases and the intrusion of malicious transactions, it has become increasingly important to model the ability of real-time database intrusion tolerance and effectively evaluate its survivability. Based on the features of transaction and data for real-time database system, an intrusion tolerant architecture has b...
Article
In order to improve the detection efficiency of intrusion detection and reduce false alarm, an approach combined rough sets and data mining is proposed to enhance the traditional intrusion detection methods. First, collected data is classified and preprocessed by normalizing the value variables and discretely processing the nominal variables, an at...

Citations

... In Chen et al. (2012) the authors describe an approach for transaction fusion. As the transactions are fused, the number of transactions will decrease. ...