Options d’inscription

Performance evaluation in computer security. Defensive system performance vs. attack tool performance. Quantitative methods for performance evaluation in computer security: mathematical models, simulation, and emulation. Laboratory experimentation methods. Intrusion Detection Systems (IDS): research, commercial deployment, and limitations. Detection by rule and anomaly. IDS evasion and imitation attacks. Malicious code detection: basic principles and current issues. Access control models. Methodology and tools for access control and identity management. Semantic models of security concepts and semantic attacks. Trust models and management systems. Privacy protection and sociopolitical impacts.
Les visiteurs anonymes ne peuvent pas accéder à ce cours. Veuillez vous connecter.