Organizational vulnerability of digital threats: A first validation of an assessment method.
Roland W. ScholzReiner CzichosPeter ParycekThomas J. LampoltshammerPublished in: Eur. J. Oper. Res. (2020)
Keyphrases
- high accuracy
- experimental evaluation
- high precision
- detection method
- fully automatic
- data sets
- synthetic data
- clustering method
- theoretical analysis
- computationally efficient
- edge detection
- preprocessing
- objective function
- denoising
- support vector machine
- significant improvement
- image quality
- prior knowledge
- intrusion detection
- optimization algorithm
- detection algorithm
- similarity measure
- information systems
- learning algorithm
- genetic algorithm