Fortification of IT Security by Automatic Security Advisory Processing.
Stefan FenzAndreas EkelhartEdgar R. WeipplPublished in: AINA (2008)
Keyphrases
- information security
- access control
- security policies
- computer security
- information assurance
- network security
- security issues
- security systems
- intrusion detection
- security level
- databases
- high security
- security protocols
- neural network
- database
- security requirements
- cyber security
- critical infrastructure
- data processing
- data management
- security management
- security measures
- security vulnerabilities