跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
An Information and Privilege Flow Model for Intrusion Detection in Computer Systems
Shiuh-Pyng Shieh
資訊工程學系
研究成果
:
Book
›
同行評審
總覽
指紋
指紋
深入研究「An Information and Privilege Flow Model for Intrusion Detection in Computer Systems」主題。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Keyphrases
Computer System
100%
Intrusion Detection
100%
Flow Model
100%
Covert Storage Channel
100%
Security Issues
60%
Operational Security
60%
Intrusion Detection System
40%
Unintended Uses
40%
Pattern-oriented
40%
Registered Trademark
40%
Access Control
20%
False Alarm
20%
Covert Channel
20%
Microsoft
20%
Unauthorized User
20%
Channel Use
20%
Unix
20%
Authentication Mechanism
20%
Data Propagation
20%
Access Control Mechanism
20%
Unauthorized Access
20%
Virus Propagation
20%
Access Authorization
20%
Access Authentication
20%
Level Evaluation
20%
Authentication Control
20%
Sector Division
20%
Penetration Resistance
20%
TCSEC
20%
Illegitimate Access
20%
Computer Science
Computer System
100%
Intrusion Detection
100%
Flow Model
100%
Security Problem
75%
Operational Security
75%
Context Dependent
50%
Access Control
25%
covert channel
25%
Authentication
25%
Fundamental Problem
25%
Intrusion Detection System
25%
Statistical Approach
25%
Unauthorized User
25%
Access Control Policies
25%
Authentication Mechanism
25%
Unauthorized Access
25%
Access Authorization
25%
System Intrusion
25%
System Penetration
25%
Information Systems
25%