How to Develop Security Case by Combining Real Life Security Experiences (Evidence) with D-case.
Vaise PatuShuichiro YamamotoPublished in: KES (2013)
Keyphrases
- real life
- security issues
- security systems
- security properties
- real world
- information retrieval
- low cost
- intrusion detection
- network security
- security requirements
- information security
- security level
- security analysis
- computer security
- functional requirements
- real time
- case base
- case study
- learning algorithm
- neural network