Keyphrases
Computer System
100%
Intrusion Detection
100%
Flow Model
100%
Covert Storage Channel
100%
Security Issues
60%
Operational Security
60%
Intrusion Detection System
40%
Unintended Uses
40%
Pattern-oriented
40%
Registered Trademark
40%
Access Control
20%
False Alarm
20%
Covert Channel
20%
Microsoft
20%
Unauthorized User
20%
Channel Use
20%
Unix
20%
Authentication Mechanism
20%
Data Propagation
20%
Access Control Mechanism
20%
Unauthorized Access
20%
Virus Propagation
20%
Access Authorization
20%
Access Authentication
20%
Level Evaluation
20%
Authentication Control
20%
Sector Division
20%
Penetration Resistance
20%
TCSEC
20%
Illegitimate Access
20%
Computer Science
Computer System
100%
Intrusion Detection
100%
Flow Model
100%
Security Problem
75%
Operational Security
75%
Context Dependent
50%
Access Control
25%
covert channel
25%
Authentication
25%
Fundamental Problem
25%
Intrusion Detection System
25%
Statistical Approach
25%
Unauthorized User
25%
Access Control Policies
25%
Authentication Mechanism
25%
Unauthorized Access
25%
Access Authorization
25%
System Intrusion
25%
System Penetration
25%
Information Systems
25%