How do information security workers use host data? A summary of interviews with security analysts.
Robert A. BridgesMichael D. IannaconeJohn R. GoodallJustin M. BeaverPublished in: CoRR (2018)
Keyphrases
- information security
- sensitive data
- data analysis
- intrusion detection
- smart card
- countermeasures
- information assurance
- security requirements
- database
- computer security
- information systems
- data collection
- data security
- security level
- data integrity
- data protection
- information security management
- network security
- data quality
- computer systems
- knowledge discovery
- data sources
- training data
- security issues
- privacy concerns
- sensitive information
- anomaly detection
- supervised learning
- case study
- cyber defense