CRYPTO '89 Proceedings on Advances in cryptology
Computer Networks and ISDN Systems
A Methodology for Testing Intrusion Detection Systems
IEEE Transactions on Software Engineering
Experiences with Specification-Based Intrusion Detection
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
The GSEC Prep Guide: Mastering SANS GIAC Security Essentials
The GSEC Prep Guide: Mastering SANS GIAC Security Essentials
Bayesian Event Classification for Intrusion Detection
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
A review of organised crime in electronic finance
International Journal of Electronic Finance
Use of distributed computing in derivative pricing
International Journal of Electronic Finance
International Journal of Electronic Finance
Data classification process for security and privacy based on a fuzzy logic classifier
International Journal of Electronic Finance
A data model for processing financial market and news data
International Journal of Electronic Finance
Using relative movement to support ANN-based stock forecasting in Thai stock market
International Journal of Electronic Finance
Report: Politicians speak out on cyberterrorism
Network Security
Project management and financial monitoring in public sector: an information support system
International Journal of Electronic Finance
Hi-index | 0.00 |
Many computerised systems use electronic models that get triggered when certain business conditions arise. Unauthorised triggering of such computerised models has been overlooked in the security literature. In this paper, we propose two frameworks to analyse the security of systems that have the data-triggering computerised model architecture. The frameworks help understand how to mitigate the cyber attacks that can be launched against the data-model systems, by modifying the computerised models or the data. We then propose a Deterministic Specification distributed intrusion Detection System (DSdIDS) to secure the data-triggering model systems from internal as well as external cyber threats.