IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
Ryuta KremerPrasanna N. WudaliSatoru MomiyamaToshinori ArakiJun FurukawaYuval EloviciAsaf ShabtaiPublished in: CoRR (2023)
Keyphrases
- intelligent systems
- security issues
- security requirements
- security level
- security measures
- security mechanisms
- human operators
- key management
- security protocols
- computational intelligence
- security analysis
- security properties
- security management
- key exchange
- security services
- data security
- information security
- soft computing
- user authentication
- cryptographic protocols
- security patterns
- data encryption
- encryption scheme
- integrity verification
- artificial intelligence
- public key encryption
- security model
- key agreement protocol
- key exchange protocol
- authentication protocol
- sensitive data
- access control
- expert systems
- private key
- stream cipher
- authentication scheme
- authentication mechanism
- diffie hellman
- building intelligent systems
- human level
- key agreement
- ambient intelligence
- integrated circuit
- security policies
- key distribution
- intrusion detection
- smart card
- trusted computing
- machine intelligence
- factor authentication
- public key
- operating system
- cloud computing
- pattern recognition