Exploring large scale security system reproducibility with the LESS simulator.
John SonchackAdam J. AvivPublished in: J. Comput. Secur. (2016)
Keyphrases
- small scale
- information security
- intrusion detection
- security systems
- security policies
- information assurance
- security issues
- network security
- access control
- real life
- computer security
- data sets
- statistical databases
- key management
- distributed systems
- real world
- encryption scheme
- security analysis
- cyber security
- security vulnerabilities
- real time