A model-based approach to security flaw detection of network protocol implementations.
Yating HsuGuoqiang ShuDavid LeePublished in: ICNP (2008)
Keyphrases
- detection algorithm
- access control
- security issues
- object detection
- detection method
- statistical databases
- detection accuracy
- false alarms
- security requirements
- security systems
- malware detection
- detection rate
- data mining
- efficient implementation
- information assurance
- data security
- automatic detection
- network security
- event detection
- false positives
- low cost
- sensor networks
- video sequences
- social networks