Using Security Logs for Collecting and Reporting Technical Security Metrics.
Risto VaarandiMauno PihelgasPublished in: MILCOM (2014)
Keyphrases
- security policies
- intrusion detection
- information security
- network security
- security issues
- access control
- security properties
- security requirements
- security protocols
- security problems
- data security
- security mechanisms
- security vulnerabilities
- data analysis
- security measures
- security management
- security threats
- information assurance
- security model
- cyber security
- key management
- functional requirements
- software systems