Improving present security through the detection of past hidden vulnerable states.
Martín BarrèreRemi BadonnelOlivier FestorPublished in: IM (2013)
Keyphrases
- detection algorithm
- access control
- detection method
- automatic detection
- false positives
- security systems
- object detection
- false alarms
- information security
- event detection
- intrusion detection
- security policies
- detection accuracy
- security issues
- computer security
- malware detection
- state transition
- security requirements
- data sets
- security risks