Log Abstraction for Information Security: Heuristics and Reproducibility.
Rafael CopsteinJeff SchwartzentruberNur Zincir-HeywoodMalcolm I. HeywoodPublished in: ARES (2021)
Keyphrases
- information security
- countermeasures
- information systems
- intrusion detection
- smart card
- security issues
- network security
- computer security
- information security management
- security requirements
- information assurance
- cyber defense
- security level
- heuristic search
- admissible heuristics
- privacy concerns
- smart grid
- risk analysis
- machine learning
- data mining
- design theory
- risk assessment
- e government
- search algorithm
- sensitive data
- security risks