apply clem comments

This commit is contained in:
Arthur Grisel-Davy 2023-10-03 05:26:50 -04:00
parent 272e230c57
commit cf7d30e6a5
6 changed files with 23 additions and 21 deletions

View file

@ -12,7 +12,6 @@ To enable further analysis, a set of algorithms is required for both runtime onl
The full range of capabilities remains to be discovered.
Successful runtime monitoring enables the detection of activity policy violations, anomalous activity detection, machine failure detection or distributed attacks.
On the other hand, pre-OS monitoring enables the detection of boot process violation at a level where common \glspl{ids} are not enabled yet.
These are just some of the possible applications of this technology, with many more to be discovered.
These are just some of the possible applications of this technology, with many more to discovered.
This proposal presents some problems to study that enable the development of physics-based security.