A methodology to include computer security, safety and resilience requirements as part of the user requirement.
D. N. J. MostertSebastiaan H. von SolmsPublished in: Comput. Secur. (1994)
Keyphrases
- computer security
- user requirements
- network security
- user interface
- anomaly detection
- computer systems
- network intrusion detection
- intrusion detection
- databases
- machine learning
- user interaction
- information security
- user profiles
- database
- data warehouse
- user preferences
- end users
- information technology
- pattern recognition
- information retrieval
- data mining
- customer requirements
- computer forensics