Keyphrases
- functional requirements
- information security
- security requirements
- intrusion detection
- information assurance
- security systems
- access control
- security issues
- computer security
- security policies
- neural network
- high security
- network security
- case study
- statistical databases
- network management
- software architecture
- high level
- security mechanisms
- control flow
- security model
- social networks
- user authentication
- security properties
- data mining
- data sets