Identification of malicious transactions in database systems | IEEE Conference Publication | IEEE Xplore