Methodology for correlations discovery in security logs.
Zdenek MartinasekPetr BlazekPavel SilhavyDavid SmekalPublished in: ICUMT (2017)
Keyphrases
- knowledge discovery
- intrusion detection
- network security
- security requirements
- information assurance
- access control
- information security
- computer security
- database
- security issues
- statistical databases
- security management
- security systems
- security protocols
- security analysis
- security policies
- wireless sensor networks
- databases