Users perception of using CBMT for information security training.
Joakim KävrestadMarie SkärgårdMarcus NohlbergPublished in: HAISA (2019)
Keyphrases
- information security
- countermeasures
- security risks
- security issues
- computer security
- security requirements
- intrusion detection
- smart card
- privacy concerns
- network security
- information security management
- information systems
- information assurance
- risk assessment
- security level
- smart grid
- cyber defense
- recommender systems
- sensitive data
- training set
- e government
- supervised learning
- probabilistic model
- iso iec
- technical issues
- object recognition
- decision making
- data mining