Incorporating Security Constraints into Mixed-Criticality Real-Time Scheduling.
Hyeongboo BaekJinkyu LeePublished in: IEICE Trans. Inf. Syst. (2017)
Keyphrases
- information security
- constrained optimization
- information assurance
- intrusion detection
- information systems
- access control
- security policies
- security issues
- security problems
- power system
- constraint satisfaction
- neural network
- geometric constraints
- data sets
- security requirements
- computer security
- cyber security
- security level
- security properties
- databases