Improving perimeter security with security-oriented program transformations.
Munawar HafizRalph E. JohnsonPublished in: SESS@ICSE (2009)
Keyphrases
- information security
- network security
- security problems
- security requirements
- information assurance
- security level
- security issues
- statistical databases
- intrusion detection
- security policies
- computer security
- security properties
- computer networks
- genetic algorithm
- functional requirements
- encryption scheme
- cyber security
- anomaly detection
- security threats
- security measures
- access control