Security analysers: administrator assistants or hacker helpers?
Steven FurnellPelagia ChiliarchakiPaul DowlandPublished in: Inf. Manag. Comput. Secur. (2001)
Keyphrases
- network security
- security policies
- access control
- network administrators
- intrusion detection
- security requirements
- information security
- security management
- risk assessment
- computer security
- security problems
- information assurance
- data security
- computer networks
- security issues
- security mechanisms
- intrusion detection system
- intelligent agents
- distributed systems
- neural network
- functional requirements
- data sets
- key management
- network management
- security systems
- security threats
- anomaly detection
- security measures