Login / Signup
Generating invariants using design and data-centric approaches for distributed attack detection.
Muhammad Azmi Umer
Aditya Mathur
Khurum Nazir Junejo
Sridhar Adepu
Published in:
Int. J. Crit. Infrastructure Prot. (2020)
Keyphrases
</>
application development
data centric
user interface
end users
data management
attack detection
case study
design process
intrusion detection system
computer networks
database systems
building blocks
data driven
multistage
conceptual model
distributed systems
databases