Using advanced data structures to enable responsive security monitoring.
Janet VorobyevaDaniel R. DelayoMichael A. BenderMartin Farach-ColtonPrashant PandeyCynthia A. PhillipsShikha SinghEric D. ThomasThomas M. KroegerPublished in: Clust. Comput. (2022)
Keyphrases
- data structure
- situational awareness
- real time
- information security
- network monitoring
- security issues
- security requirements
- monitoring system
- information assurance
- access control
- security systems
- security policies
- statistical databases
- security problems
- decision support
- wireless sensor
- intrusion detection
- security level
- computer security
- key management
- cyber physical systems
- security threats
- sensor networks
- security management
- security measures
- security protocols
- cyber security
- data types
- security analysis
- network security
- index structure
- smart card
- data acquisition