A Model-Based Method for Security Configuration Verification.
Hiroshi SakakiKazuo YanooRyuichi OgawaPublished in: IWSEC (2006)
Keyphrases
- experimental evaluation
- significant improvement
- preprocessing
- cost function
- high accuracy
- computationally efficient
- pairwise
- high precision
- computational cost
- detection method
- probabilistic model
- security issues
- detection algorithm
- support vector machine svm
- input data
- feature set
- data sets
- artificial neural networks
- objective function