Frank S. Rietta

  • Citations Per Year
Learn More
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the applications and not the database directly, there are some techniques that can be deployed to mitigate the risk at the database server. Database intrusion detection systems are often based on(More)
Managing spam is an increasingly critical function for businesses of all sizes. According to the February, 2007, issue of the Communications of the ACM, the overall volume of spam has increased from 10%, in 1998, to 80%, today [1]. The onslaught of spam significantly degrades the reliability of e-mail for business communication. Many web sites provide(More)
To some, business intelligence (BI) is a buzzword used in management circles to garner support for an IT project. To others, it may sound like a dressed-up way of saying data mining. BI is neither a product nor a system, but it is a method of collecting data from various sources and turning it into actionable information [4]. BI projects typically implement(More)
  • 1