Return to Article Details A Review of Security Mechanisms for Detection of Malicious Transactions in Database Download Download PDF