Security applications: lessons of real-world deployment.
James PitaHarish BellamaneManish JainChristopher KiekintveldJason TsaiFernando OrdóñezMilind TambePublished in: SIGecom Exch. (2009)
Keyphrases
- real world
- security management
- case study
- lessons learned
- security requirements
- wide range
- real life
- network security
- security analysis
- security issues
- data sets
- information security
- synthetic data
- intrusion detection
- statistical databases
- database systems
- data integrity
- data security
- security problems
- access control
- security policies
- synthetic datasets
- distributed systems
- functional requirements
- data mining
- cyber security
- security systems
- databases