T-dominance: Prioritized defense deployment for BYOD security.
Wei PengFeng LiKeesook J. HanXukai ZouJie WuPublished in: CNS (2013)
Keyphrases
- network security
- intrusion detection
- cyber defense
- computer security
- security issues
- defense mechanisms
- information security
- security policies
- security mechanisms
- statistical databases
- information assurance
- access control
- security requirements
- security protocols
- data sets
- security systems
- cyber attacks
- dominance relation
- security problems
- key management
- security vulnerabilities
- security management
- cyber security
- network management
- computer networks
- evolutionary algorithm