Login / Signup
Security Requirements Elicitation Using Method Weaving and Common Criteria.
Motoshi Saeki
Haruhiko Kaiya
Published in:
MoDELS (Workshops) (2008)
Keyphrases
</>
significant improvement
detection method
high accuracy
cost function
intrusion detection
clustering method
decision making
similarity measure
objective function
preprocessing
database
clustering algorithm
knowledge acquisition
segmentation method