Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications.
Jemal H. AbawajyAndrei V. KelarevMirka MillerJoseph F. RyanPublished in: Math. Comput. Sci. (2015)
Keyphrases
- information security
- countermeasures
- intrusion detection
- security issues
- computer security
- information systems
- smart card
- network security
- information assurance
- information security management
- security level
- risk assessment
- smart grid
- security requirements
- e government
- cyber defense
- data security
- risk analysis
- technical issues
- iso iec
- sensitive data
- security risks
- distance measure
- decision making