Identification of IT Security-Relevant System Characteristics.
Jonas HallbergAmund HunstadAnna StjernebyPublished in: IAW (2003)
Keyphrases
- intrusion detection
- access control
- previously identified
- information security
- statistical databases
- security systems
- database
- data mining
- network security
- security issues
- automatic identification
- information assurance
- security vulnerabilities
- high security
- security management
- data security
- security analysis
- computer security
- sensitive data
- cloud computing
- case study
- information systems
- real time