Using data-independence in the analysis of intrusion detection systems
DOI10.1016/J.TCS.2005.03.004zbMATH Open1142.68446OpenAlexW2025720030MaRDI QIDQ557891FDOQ557891
Authors: Gordon Thomas Rohrmair, Gavin Lowe
Publication date: 30 June 2005
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://ora.ox.ac.uk/objects/uuid:ee2e446d-af6b-4539-8dd4-b43b663d93d7
Recommendations
Model checkingCommunicating Sequential ProcessesData independenceDesynchronisation attacksIntrusion detection
Specification and verification (program logics, model checking, etc.) (68Q60) Network design and communication in computer systems (68M10) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Network protocols (68M12)
Cites Work
Cited In (8)
- A log analyzing system for Linux LASL
- Title not available (Why is that?)
- Title not available (Why is that?)
- Towards an information-theoretic framework for analyzing intrusion detection systems
- Towards a theory of intrusion detection
- Data-flow dependency-based trusted recovery method
- Title not available (Why is that?)
- Title not available (Why is that?)
Uses Software
This page was built for publication: Using data-independence in the analysis of intrusion detection systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q557891)