apply clem comments
This commit is contained in:
parent
272e230c57
commit
cf7d30e6a5
6 changed files with 23 additions and 21 deletions
|
|
@ -12,7 +12,6 @@ To enable further analysis, a set of algorithms is required for both runtime onl
|
|||
The full range of capabilities remains to be discovered.
|
||||
Successful runtime monitoring enables the detection of activity policy violations, anomalous activity detection, machine failure detection or distributed attacks.
|
||||
On the other hand, pre-OS monitoring enables the detection of boot process violation at a level where common \glspl{ids} are not enabled yet.
|
||||
These are just some of the possible applications of this technology, with many more to be discovered.
|
||||
These are just some of the possible applications of this technology, with many more to discovered.
|
||||
|
||||
This proposal presents some problems to study that enable the development of physics-based security.
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue