Two approaches to an information security laboratory.
Michael NäfDavid A. BasinPublished in: Commun. ACM (2008)
Keyphrases
- information security
- countermeasures
- security issues
- computer security
- intrusion detection
- network security
- information systems
- information security management
- smart card
- cyber defense
- model selection
- data mining techniques
- e government
- smart grid
- feature selection
- data security
- technical issues
- database
- information assurance