Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications.
Chris W. JohnsonPublished in: SAFECOMP (2015)
Keyphrases
- safety critical
- intrusion detection system
- intrusion detection
- formal methods
- agent architecture
- network security
- fault tolerant
- anomaly detection
- embedded systems
- computer networks
- network traffic
- support systems
- computer systems
- network intrusion detection systems
- distributed intrusion detection
- adaptive systems
- cyber attacks
- real time
- intrusion prevention
- alert correlation
- artificial intelligence
- data mining
- information security
- data processing
- data analysis
- machine learning
- normal behavior
- attack scenarios
- databases