Time-Based Trace Clustering for Evolution-Aware Security Audits.
Thomas StockerPublished in: Business Process Management Workshops (2) (2011)
Keyphrases
- clustering algorithm
- hierarchical clustering
- k means
- information assurance
- clustering method
- information security
- access control
- taking care
- security issues
- data clustering
- statistical databases
- graph theoretic
- security requirements
- security systems
- cluster analysis
- data objects
- information systems
- network security
- categorical data
- self organizing maps
- authentication protocol
- security management
- intrusion detection
- anomaly detection