Unveiling Hidden Links Between Unseen Security Entities.
Daniel AlfasiTal ShapiraAnat Bremler BarrPublished in: CoRR (2024)
Keyphrases
- access control
- information security
- security issues
- intrusion detection
- network security
- security policies
- named entities
- statistical databases
- security systems
- computer security
- security level
- security problems
- previously unseen
- security protocols
- security threats
- security measures
- information assurance
- networked data
- key management
- hidden information
- data sets
- multiple types
- security requirements
- neural network