Login / Signup
Data-Driven Field Mapping of Security Logs for Integrated Monitoring.
Seungoh Choi
Yesol Kim
Jeong-Han Yun
Byung-Gil Min
HyoungChun Kim
Published in:
Critical Infrastructure Protection (2019)
Keyphrases
</>
data driven
information security
monitoring system
network monitoring
security issues
computer security
real time
access control
security policies
biometric systems
security requirements
human operators
functional requirements
intrusion detection
wireless sensor
security level
information assurance