Back to Results
First PageMeta Content
Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security


Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut
Add to Reading List

Document Date: 2002-09-10 02:20:42


Open Document

File Size: 104,29 KB

Share Result on Facebook

City

Syracuse / River / New York / SAPHIRE / Cambridge / Indianapolis / Reading / /

Company

Jet Propulsion Laboratory / Prentice-Hall / MIT Press / D. G. Assurance Technologies / Palisade Systems Inc. / Evolution & Incremental Development Software / McGraw-Hill / Environmental Laboratory / IEEE Software / Intrusion.Net / /

Country

United States / /

/

Facility

building IDS / Jet Propulsion Laboratory / To bridge / Hall PTR / California Institute of Technology / /

IndustryTerm

detection systems / installation media / software safety / security applications / remote control services / domain using software / remote shell server / software requirements analysis / host systems / software requirements / online access / backward search / lower-level software events / developed software fault / agent software / mobile agent software / cutset-based solutions / combinatorial solutions / data mining agents / process-control systems / network protocols / software monitors / /

NaturalFeature

command/response stream / /

OperatingSystem

UNIX / Linux / FreeBSD / Microsoft Windows / /

Organization

California Institute of Technology / MIT / Idaho National Engineering and Environmental Lab / FTP command / Internet Engineering Task Force / National Aeronautics and Space Administration / Department of Defense / /

Person

Johnny Wong / Robyn Lutz / Guy Helmer / Mark Slagell / /

Position

editor / system administrator / system manager / administrator / Requirements analysis using forward / representative / /

ProgrammingLanguage

Ada / /

ProvinceOrState

New Jersey / Oregon / New York / Idaho / /

PublishedMedium

IEEE Software / /

Technology

LAN / Linux / UNIX / Information Technology / machine learning / operating system / TCP/IP / DNS / Computer Security Technology / data mining / paging / simulation / network protocols / /

URL

www.securityfocus.com / http /

SocialTag