Evaluating Security Specification Mining for a CISC Architecture.
Calvin DeutschbeinCynthia SturtonPublished in: HOST (2020)
Keyphrases
- information security
- management system
- intrusion detection
- digital rights management
- security issues
- mining algorithm
- data mining
- specification language
- network monitoring
- text mining
- access control
- enterprise systems
- security requirements
- communication protocols
- network architecture
- security architecture
- software architecture
- knowledge discovery
- high level
- reactive systems
- security policies
- statistical databases
- real time
- pattern mining
- frequent patterns
- sensitive data
- highly distributed
- intrusion detection and prevention