Diagnosing Runtime Violations of Security & Dependability Properties.
Theocharis TsigkritisGeorge SpanoudakisPublished in: SEKE (2008)
Keyphrases
- desirable properties
- security management
- intrusion detection
- ambient intelligence
- network security
- security policies
- information security
- constraint violations
- real time
- data security
- cyber security
- statistical databases
- intrusion detection system
- complex systems
- information systems
- genetic algorithm
- neural network