Threat-model-driven runtime adaptation and evaluation of intrusion detection system.
Martin RehákEugen StaabVolker FusenigJan StiborekMartin GrillKarel BartosMichal PechoucekThomas EngelPublished in: ICAC (2009)
Keyphrases
- model driven
- intrusion detection system
- intrusion detection
- data driven
- network security
- anomaly detection
- service oriented
- computer networks
- distributed intrusion detection
- network intrusion detection
- model driven development
- network traffic
- data integration
- metamodel
- databases
- service oriented architecture
- attack detection
- computer systems
- e learning
- network attacks
- artificial intelligence