Network Security and Storage Security: Symmetries and Symmetry-Breaking.
Donald BeaverPublished in: IEEE Security in Storage Workshop (2002)
Keyphrases
- network security
- symmetry breaking
- intrusion detection
- constraint programming
- security policies
- information security
- computer networks
- security breaches
- intrusion detection system
- traffic analysis
- computer security
- search tree
- dos attacks
- security protection
- risk assessment
- integer linear programming
- constraint satisfaction problems
- network traffic
- anomaly detection
- network administrators
- symmetry breaking constraints
- global constraints
- cyber security
- situation assessment
- sat solvers
- graph coloring
- cyber attacks
- constraint satisfaction
- smart card
- denial of service
- access control
- genetic programming
- knowledge discovery
- lower bound