A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Simon E. ParkinAad P. A. van MoorselPhilip InglesantMartina Angela SassePublished in: NSPW (2010)
Keyphrases
- information security
- security issues
- information assurance
- intrusion detection
- computer security
- security measures
- security requirements
- security policies
- database
- access control
- network security
- real time
- security problems
- security mechanisms
- functional requirements
- high security
- security management
- security level
- security systems
- security analysis
- genetic algorithm
- statistical databases
- data sets
- databases
- decision making