Targeted risk communication for computer security.
Jim BlytheL. Jean CampVaibhav GargPublished in: IUI (2011)
Keyphrases
- computer security
- computer systems
- information security
- network security
- communication systems
- anomaly detection
- intrusion detection
- risk assessment
- network intrusion detection
- intrusion detection system
- communication networks
- computer networks
- database
- risk management
- clustering algorithm
- data model
- reinforcement learning
- face recognition
- decision making
- databases