How to build a vulnerability benchmark to overcome cyber security attacks.
Junaid AkramPing LuoPublished in: IET Inf. Secur. (2020)
Keyphrases
- cyber security
- cyber attacks
- security breaches
- smart grid
- intrusion detection
- buffer overflow
- senior citizens
- intrusion detection system
- security issues
- critical infrastructure
- network security
- countermeasures
- visual analytics
- security mechanisms
- cyber crime
- risk assessment
- databases
- information security
- personal information
- computer networks
- power system
- dos attacks
- unsupervised learning
- computational intelligence
- security and privacy issues
- association rules
- data mining