Security System for Overlapping Non-dedicated Clusters.
Martin StávaPavel TvrdíkPublished in: ISPA (2009)
Keyphrases
- clustering algorithm
- information security
- security requirements
- security issues
- security problems
- intrusion detection
- hierarchical clustering
- information assurance
- data clustering
- access control
- computer security
- cluster analysis
- security management
- data points
- security level
- security systems
- security threats
- network security
- fuzzy clustering
- graph clustering
- security policies
- security properties
- data security
- unsupervised clustering
- neural network
- database
- cyber security
- functional requirements
- arbitrary shape
- input data
- hierarchical structure