Automation of the construction of models of normal program behavior
From MaRDI portal
Recommendations
- Intrusion detection based on system calls and homogeneous Markov chains
- Program anomaly detecting approach based on behaviors analysis
- A model of the behavior of network objects in distributed computer systems
- Recognizing malicious software behaviors with tree automata inference
- Early detection algorithm for attacks against information resources of automatic manufacturing control systems
Cites work
- scientific article; zbMATH DE number 5254145 (Why is no real title available?)
- A Hybrid Approach for Safe Memory Management in C
- A model of the behavior of network objects in distributed computer systems
- An overview of the runtime verification tool Java PathExplorer
- Provably correct runtime monitoring
- Resource usage verification.
- The essence of command injection attacks in web applications
- Verification, Model Checking, and Abstract Interpretation
Cited in
(4)
This page was built for publication: Automation of the construction of models of normal program behavior
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1758718)