Keyphrases
- relational databases
- access control
- intrusion detection
- security requirements
- information security
- security issues
- information assurance
- security policies
- network security
- statistical databases
- databases
- maximum a posteriori
- computer security
- neural network
- high security
- security threats
- security level
- security systems
- data management
- big data
- key management
- cyber security
- authentication protocol
- functional requirements
- cryptographic protocols
- network management
- security management
- anomaly detection