Metadata for Anomaly-Based Security Protocol Attack Deduction.
Tysen LeckieAlec YasinsacPublished in: IEEE Trans. Knowl. Data Eng. (2004)
Keyphrases
- security protocols
- metadata
- authentication protocol
- block cipher
- anomaly detection
- security services
- cryptographic algorithms
- digital libraries
- key management
- artificial immune algorithm
- security measures
- normal behavior
- databases
- security properties
- multimedia
- intrusion detection
- secret key
- rfid tags
- data warehouse
- security mechanisms
- countermeasures
- multimedia content
- rfid systems
- smart card
- security requirements
- authentication scheme
- intrusion detection system
- database