Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules.
Patrick StöckleMichael SammereierBernd GrobauerAlexander PretschnerPublished in: CoRR (2023)
Keyphrases
- information security
- network security
- access control
- intrusion detection
- fully automated
- semi automated
- security requirements
- human operators
- association rules
- security systems
- computer aided
- statistical databases
- security properties
- neural network
- data security
- security analysis
- key management
- rule based systems
- decision rules
- database systems