Runtime verification with minimal intrusion through parallelism.
Shay BerkovichBorzoo BonakdarpourSebastian FischmeisterPublished in: Formal Methods Syst. Des. (2015)
Keyphrases
- intrusion detection
- intrusion detection system
- verification method
- parallel processing
- network security
- data sets
- shared memory
- parallel computing
- face verification
- formal verification
- signature verification
- malicious users
- high security
- parallel computation
- massively parallel
- data structure
- artificial intelligence