Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.
Zhen HuangMariana D'AngeloDhaval MiyaniDavid LiePublished in: IEEE Symposium on Security and Privacy (2016)
Keyphrases
- rapid response
- information security
- security vulnerabilities
- security issues
- security mechanisms
- security breaches
- security patterns
- security risks
- security requirements
- real time
- intrusion detection
- security problems
- buffer overflow
- computer security
- security flaws
- security threats
- network security
- security protocols
- cyber security
- security level
- information assurance
- access control
- security systems
- security properties
- smart card
- smart grid
- data sets
- information systems
- data corruption
- database
- wireless sensor networks
- information sharing
- denial of service
- intrusion detection system
- security management
- network traffic