Sonification in security operations centres: what do security practitioners think?
Louise M. AxonBushra A. AlAhmadiJason R. C. NurseMichael GoldsmithSadie CreesePublished in: CoRR (2018)
Keyphrases
- information security
- information systems
- security issues
- intrusion detection
- information assurance
- security mechanisms
- real world
- network security
- access control
- key management
- security level
- security problems
- case study
- functional requirements
- cyber security
- data security
- computer networks
- security measures
- cryptographic protocols
- security systems
- security requirements
- risk assessment
- security policies
- cutting edge