Guidelines for Systematic Mapping Studies in Security Engineering.
Michael FeldererJeffrey C. CarverPublished in: CoRR (2018)
Keyphrases
- access control
- intrusion detection
- security policies
- information security
- data sets
- statistical databases
- computer science
- database
- security threats
- network security
- security protocols
- security requirements
- security vulnerabilities
- software engineering
- design guidelines
- engineering problems
- security systems
- computer security
- encryption scheme
- functional requirements
- security issues
- literature review
- artificial intelligence
- information systems
- case study
- e government