2008 Second International Conference on Emerging Security Information, Systems and Technologies 2008
DOI: 10.1109/securware.2008.58
|View full text |Cite
|
Sign up to set email alerts
|

From Monitoring Templates to Security Monitoring and Threat Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 20 publications
(27 reference statements)
0
9
0
Order By: Relevance
“…The process of defining analysis goals may require domain knowledge and skill in building and analysing models. However, the process can be partially or fully automated by following the pattern-based approach proposed of [11]. [11] uses the Formal Template Language [19], [13] to represent patterns of EC models together with their associated security monitoring goals.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The process of defining analysis goals may require domain knowledge and skill in building and analysing models. However, the process can be partially or fully automated by following the pattern-based approach proposed of [11]. [11] uses the Formal Template Language [19], [13] to represent patterns of EC models together with their associated security monitoring goals.…”
Section: Discussionmentioning
confidence: 99%
“…However, the process can be partially or fully automated by following the pattern-based approach proposed of [11]. [11] uses the Formal Template Language [19], [13] to represent patterns of EC models together with their associated security monitoring goals. [11] defines templates of such goals that are of the security violation type, but patterns of suspicious goals can also be defined if we know in advance what can arouse suspicion.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations