Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and Derivation.
Jungwoo RyooPhillip A. LaplanteRick KazmanPublished in: SERE (Companion) (2012)
Keyphrases
- information security
- security issues
- security requirements
- computer security
- security mechanisms
- information assurance
- intrusion detection
- statistical databases
- security protocols
- security level
- security systems
- abstraction hierarchy
- security vulnerabilities
- security threats
- image decomposition
- data security
- decomposition method
- security policies
- decomposition algorithm
- security measures
- neural network
- database