The Design and Implementation of Security Defense Technology Based on Mandatory Running Control.
Jizhen LiuKehe WuTong ZhangGang MaPublished in: IAS (2009)
Keyphrases
- case study
- intrusion detection
- high level synthesis
- network security
- control structure
- current status
- intelligent software
- efficient implementation
- control program
- functional requirements
- user interface
- addressing these issues
- real time embedded
- control strategy
- cost effective
- design methodology
- control method
- core components
- virtual instrument
- object oriented technology
- information security
- design process
- computer systems
- rapid application development