Quantifying computational security subject to source constraints, guesswork and inscrutability.
Ahmad BeiramiA. Robert CalderbankKen R. DuffyMuriel MédardPublished in: ISIT (2015)
Keyphrases
- intrusion detection
- information security
- security requirements
- linear constraints
- access control
- security issues
- mathematical programming
- statistical databases
- computer security
- security policies
- security management
- databases
- global constraints
- computational models
- constraint satisfaction
- search space
- genetic algorithm
- neural network