A highly effective model for security protection against eavesdropping exploits.
Supachai TangwongsanSathaporn KassuvanPublished in: ICIS (2009)
Keyphrases
- high level
- computational model
- theoretical analysis
- formal model
- probabilistic model
- statistical model
- security model
- management system
- neural network
- mathematical model
- intrusion detection
- security issues
- information security
- hierarchical structure
- access control
- prior knowledge
- objective function
- machine learning
- data mining