Specification Modeling and Validation Applied to Network Security Gateways.
Robert J. HallPublished in: RE (2001)
Keyphrases
- network security
- intrusion detection
- intrusion detection system
- computer networks
- traffic analysis
- computer security
- information security
- dos attacks
- anti phishing
- security protection
- situation assessment
- risk assessment
- network intrusion
- network intrusion detection
- real time
- security policies
- data processing
- databases