Training Security Assurance Teams Using Vulnerability Injection.
José FonsecaMarco VieiraHenrique MadeiraPublished in: PRDC (2008)
Keyphrases
- information security
- cooperative
- risk assessment
- security vulnerabilities
- security issues
- training phase
- training process
- intrusion detection
- team members
- security policies
- training algorithm
- access control
- computer security
- security requirements
- statistical databases
- security systems
- denial of service attacks
- penetration testing
- network security
- test set
- online learning
- neural network
- information flow
- cyber security
- data security
- security threats
- security risks
- anomaly detection
- buffer overflow
- training data