Feedback-based smartphone strategic sampling for BYOD security.
Feng LiChin-Tser HuangJie HuangWei PengPublished in: ICCCN (2014)
Keyphrases
- information security
- security policies
- intrusion detection
- human operators
- case study
- access control
- information assurance
- monte carlo
- sample size
- network security
- security issues
- security systems
- random sampling
- security requirements
- sampling strategy
- data sets
- database
- knowledge management
- competitive environment
- security measures
- security problems
- security properties
- security protocols
- security analysis
- sampling methods
- functional requirements
- sensitive data
- neural network
- user feedback
- decision making
- database systems
- relevance feedback