A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises.
Najib SaylaniPublished in: Security and Management (2004)
Keyphrases
- real time
- low cost
- high speed
- intrusion detection
- security issues
- genetic algorithm
- access control
- real time systems
- computer security
- cyber security
- security policies
- security administration
- telecommunication systems
- information assurance
- security level
- wireless sensor
- information security
- data acquisition
- vision system
- neural network