A brink of failure and breach of security detection and recovery system.
Andrew R. McGeeChun K. ChanDavid D. PicklesimerUma ChandrashekharSteven H. RichmanEdwin O. LambertPublished in: Bell Labs Tech. J. (2003)
Keyphrases
- intrusion detection
- failure recovery
- anomaly detection
- detection algorithm
- detection rate
- false alarms
- failure detection
- information security
- false positives
- security requirements
- neural network
- statistical databases
- detection accuracy
- access control
- automatic detection
- personal data
- object detection
- detection method
- network security
- database
- fault tolerance
- security issues
- sensitive data
- data privacy
- computer security
- security protocols
- error detection
- security threats