Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Mengmeng GeHuy Kang KimDong Seong KimPublished in: CoRR (2017)
Keyphrases
- information security
- security issues
- information assurance
- security requirements
- security problems
- access control
- statistical databases
- security management
- security systems
- security level
- cyber attacks
- data security
- data integrity
- key management
- security model
- security protocols
- security analysis
- neural network
- network management
- risk assessment
- security policies
- case study
- information systems
- data mining