Risk assessment of security threats for looping constructs.
Pasquale MalacariaPublished in: J. Comput. Secur. (2010)
Keyphrases
- risk assessment
- security threats
- security issues
- information security
- risk management
- security mechanisms
- network security
- key management
- decision making
- sensitive data
- intrusion detection
- economic impact
- information systems
- data sets
- computer networks
- intrusion detection system
- computational intelligence
- software engineering
- object oriented
- data warehouse
- resource constrained
- real time
- database