Must security listen to Kokoro?
Karmele López de IpiñaCarmen HernándezNora BarrosoAitzol EzeizaPublished in: ICCST (2011)
Keyphrases
- information security
- access control
- network security
- security systems
- security requirements
- security mechanisms
- security problems
- information systems
- intrusion detection
- security policies
- data security
- information assurance
- security issues
- security management
- human operators
- security measures
- security model
- computer security
- risk analysis
- neural network
- learning algorithm