Usable Security Management for Network Access Rules of Critical Infrastructure.
Jeong-Han YunSeungoh ChoiWoonyon KimHwasun KangSung-Woo KimPublished in: HCI (22) (2017)
Keyphrases
- security management
- network access
- network security
- security policies
- critical infrastructure
- cyber security
- access control
- information security
- smart grid
- intrusion detection
- security issues
- multi tier
- intrusion detection system
- association rules
- control system
- computer networks
- cloud computing
- risk analysis
- network management
- distributed systems
- data mining
- data acquisition
- homeland security
- data management
- network traffic
- data warehouse
- wireless networks
- anomaly detection