Vulnerabilities and responsibilities: dealing with monsters in computer security.
Wolter PietersLuca ConsoliPublished in: J. Inf. Commun. Ethics Soc. (2009)
Keyphrases
- computer security
- information security
- computer systems
- countermeasures
- intrusion detection
- network security
- computer viruses
- information systems
- anomaly detection
- security issues
- security vulnerabilities
- network intrusion detection
- intrusion detection system
- computer forensics
- smart card
- data mining
- e government
- case study
- data processing
- principal component analysis
- security measures
- computer vision
- data sets