Security experimentation using operational systems.
Ilker ÖzçelikRichard R. BrooksPublished in: CSIIRW (2011)
Keyphrases
- security issues
- information security
- network security
- computer security
- access control
- information assurance
- intrusion detection
- security systems
- security level
- smart card
- security threats
- security policies
- cyber attacks
- security requirements
- security mechanisms
- security problems
- security management
- risk assessment
- sensitive data
- database
- case study
- data mining
- neural network
- data sets
- real time