Evaluating Security Through Isolation and Defense in Depth.
Eric BoddenJens PottebaumMarkus FockelIris GräßlerPublished in: IEEE Secur. Priv. (2024)
Keyphrases
- network security
- intrusion detection
- information security
- cyber defense
- defense mechanisms
- computer security
- security policies
- security requirements
- intrusion detection system
- security problems
- information systems
- access control
- statistical databases
- security management
- security level
- malware detection
- security issues
- network management
- depth map
- security measures
- neural network
- computer virus
- cyber attacks
- database security
- risk analysis
- security mechanisms
- network traffic
- anomaly detection
- high quality
- data mining