Keyphrases
- intrusion detection
- information security
- network security
- access control
- functional requirements
- computer security
- learning algorithm
- security issues
- security level
- security requirements
- security measures
- security problems
- security properties
- cryptographic protocols
- cyber attacks
- security mechanisms
- statistical databases
- risk assessment
- security policies
- cost effective
- information systems