Towards a reliable mapping between performance and security tactics, and architectural patterns.
Azadeh AlebrahimStephan FassbenderMartin FilipczykMichael GoedickeMaritta HeiselPublished in: EuroPLoP (2015)
Keyphrases
- access control
- databases
- pattern mining
- information security
- security issues
- neural network
- intrusion detection
- cost effective
- computer networks
- security problems
- security systems
- security vulnerabilities
- database
- security patterns
- security measures
- previously unknown
- network management
- software architecture
- operating system
- data sets