On Improvements of Low-Deterministic Security.
Joachim BreitnerJürgen GrafMartin HeckerMartin MohrGregor SneltingPublished in: POST (2016)
Keyphrases
- network security
- information security
- security issues
- security problems
- intrusion detection
- access control
- black box
- security policies
- security requirements
- data sets
- genetic algorithm
- information assurance
- security threats
- cyber security
- security protocols
- security mechanisms
- network management
- risk assessment
- case study
- information systems
- data mining