Security defense against long-term and stealthy cyberattacks.
Kookyoung HanJin Hyuk ChoiYunsik ChoiGene Moo LeeAndrew B. WhinstonPublished in: Decis. Support Syst. (2023)
Keyphrases
- long term
- network security
- intrusion detection
- short term
- cyber defense
- information security
- security policies
- defense mechanisms
- access control
- information assurance
- security problems
- security management
- computer networks
- data security
- key management
- security threats
- security systems
- functional requirements
- risk assessment
- network traffic
- computer virus
- security properties
- security mechanisms
- security level
- security model
- cyber security
- smart grid
- data sets
- anomaly detection
- information systems
- data mining
- neural network