Login / Signup
Applying DODAF 2.0 Modeling Techniques to a Real-Time Security Analyzer.
Drew Hamilton
Derek T. Sanders
Robert McGraw
Aaron Corder
Teng K. Ooi
Published in:
HSC (2009)
Keyphrases
</>
real time
situational awareness
intrusion detection
access control
data acquisition
computer vision
low cost
network security
security policies
modeling method
real time systems
data security
information security
risk assessment
security vulnerabilities