Black hat training of white hat resources: The future of security is gaming.
Jason FloodMark DenihanAnthony KeaneFredrick MtenziPublished in: ICITST (2012)
Keyphrases
- long term
- information security
- resource management
- security requirements
- virtual environment
- educational institutions
- training process
- access control
- limited resources
- training examples
- computer security
- serious games
- computing infrastructure
- security threats
- key management
- statistical databases
- real world
- cloud computing
- resource allocation
- test set
- intrusion detection