Discovering and utilising expert knowledge from security event logs.
Saad KhanSimon ParkinsonPublished in: J. Inf. Secur. Appl. (2019)
Keyphrases
- expert knowledge
- event logs
- security policies
- process mining
- expert systems
- domain knowledge
- access control
- knowledge engineering
- bayesian networks
- process model
- fuzzy logic
- domain experts
- network security
- prior knowledge
- knowledge elicitation
- business process
- learned knowledge
- knowledge base
- information security
- log files
- intrusion detection
- real world
- formal concept analysis
- business processes
- computer systems
- distributed systems
- knowledge discovery
- knowledge representation
- user interface
- genetic algorithm