Login / Signup
Constructing a Complete Timeline of a Security Incident by Aggregating Reports.
Hiroki Kuzuno
Shun Inagaki
Kenichi Magata
Published in:
AsiaJCIS (2018)
Keyphrases
</>
security issues
computer security
access control
intrusion detection
security policies
security level
genetic algorithm
wireless sensor networks
information security
statistical databases
security requirements
data security
security systems
security measures
information assurance