On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Anca JurcutTom CoffeyReiner DojenPublished in: CN (2014)
Keyphrases
- detection algorithm
- object detection
- detection method
- model checking
- false positives
- database systems
- knowledge representation
- detection accuracy
- java card
- attack detection
- worm detection
- knowledge base
- detect malicious
- network intrusion detection systems
- malicious attacks
- security risks
- signature verification
- false alarms
- software tools