Login / Signup
Toward evaluating the impact of self-adaptation on security control certification.
Allen Marshall
Sharmin Jahan
Rose F. Gamble
Published in:
SEAMS@ICSE (2018)
Keyphrases
</>
control system
human operators
computer security
evolutionary algorithm
intrusion detection
data acquisition
control method
information security
network security
security policies
security issues
robotic systems
statistical databases
security requirements
security protocols
database security