From intrusion detection to software design

11Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

I believe the single most important reason why we are so helpless against cyber-attackers is that present systems are not supervisable. This opinion is developed in years spent working on network intrusion detection, both as academic and entrepreneur. I believe we need to start writing software and systems that are supervisable by design; in particular, we should do this for embedded devices. In this paper, I present a personal view on the field of intrusion detection, and conclude with some consideration on software design.

Cite

CITATION STYLE

APA

Etalle, S. (2017). From intrusion detection to software design. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10492 LNCS, pp. 1–10). Springer Verlag. https://doi.org/10.1007/978-3-319-66402-6_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free