Login / Signup
Using Proven Reference Monitor Patterns for Security Evaluation.
Mark R. Heckman
Roger R. Schell
Published in:
Inf. (2016)
Keyphrases
</>
information security
real time
access control
evaluation criteria
website
pattern discovery
evaluation method
interesting patterns
security policies
previously unknown
security systems
data mining techniques
intrusion detection
monitoring system
security issues
security requirements