Automating Security in a Continuous Integration Pipeline.
Sohrab ChalishhafshejaniBao Khanh PhamMartin Gilje JaatunPublished in: IoTBDS (2022)
Keyphrases
- access control
- information security
- security policies
- security measures
- security management
- security problems
- security issues
- intrusion detection
- data fusion
- computer security
- security requirements
- security systems
- security mechanisms
- cyber security
- information assurance
- data security
- security level
- cryptographic protocols
- security properties
- database
- security protocols
- data integrity
- key management
- functional requirements
- piecewise linear
- network security
- case study
- genetic algorithm
- neural network
- data sets