Configuration-Based Approach to Embedded Device Security.
Vasily DesnitskyIgor V. KotenkoAndrey ChechulinPublished in: MMM-ACNS (2012)
Keyphrases
- virtual private network
- security policies
- security issues
- information security
- intrusion detection
- access control
- computer security
- information assurance
- security measures
- security level
- statistical databases
- functional requirements
- security requirements
- configuration space
- security problems
- security threats
- network security
- network configuration
- security systems
- security properties
- security vulnerabilities
- embedded systems
- anomaly detection