On Optimizing the Path to Information Security Compliance.
Mauricio DiéguezSamuel SepúlvedaCarlos CaresPublished in: QUATIC (2012)
Keyphrases
- information security
- countermeasures
- security issues
- network security
- intrusion detection
- smart card
- data protection
- computer security
- information systems
- information security management
- security requirements
- information assurance
- cyber defense
- security level
- e government
- smart grid
- iso iec
- risk assessment
- sensitive data
- data security
- databases
- data mining
- information retrieval
- case study
- data analysis
- design theory
- technical issues
- active learning
- supervised learning
- privacy concerns
- anomaly detection