Policy-Based Method for Applying OAuth 2.0-Based Security Profiles.
Takashi NorimatsuYuichi NakamuraToshihiro YamauchiPublished in: IEICE Trans. Inf. Syst. (2023)
Keyphrases
- experimental evaluation
- high accuracy
- segmentation method
- preprocessing
- computational cost
- support vector machine svm
- information systems
- theoretical analysis
- computationally efficient
- cost function
- significant improvement
- objective function
- dynamic programming
- prior knowledge
- feature set
- pairwise
- multiscale
- detection algorithm
- neural network
- security policies