The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Existing modeling frameworks for manufacturing system control can be classified into hierarchical, heterarchical, and hybrid control frameworks. The main drawbacks of existing fram...
Sunderesh S. Heragu, Robert J. Graves, Byung-In Ki...
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...