A Tale of Three Security Operation Centers.
Sathya Chandran SundaramurthyJacob CaseTony TruongLoai ZomlotMarcel HoffmannPublished in: SIW@CCS (2014)
Keyphrases
- information security
- security requirements
- access control
- security policies
- security systems
- security vulnerabilities
- network security
- security problems
- intrusion detection
- security issues
- computer security
- information assurance
- real time
- security threats
- information systems
- security analysis
- data security
- security mechanisms
- statistical databases
- case study
- security management
- security measures
- social networks