Security Made, Not Perfect, But Automatic (Transcript of Discussion).
Paulo VeríssimoPublished in: Security Protocols Workshop (2010)
Keyphrases
- access control
- semi automatic
- information security
- data security
- computer security
- intrusion detection
- fully automatic
- network security
- security policies
- security issues
- information assurance
- data mining
- security management
- security protocols
- security mechanisms
- network management
- content analysis
- cloud computing
- data driven
- case study