Attack Modelling and Security Evaluation for Security Information and Event Management.
Igor V. KotenkoAndrey ChechulinEvgenia NovikovaPublished in: SECRYPT (2012)
Keyphrases
- security level
- information sources
- intrusion detection
- security issues
- information flow
- information security
- security risks
- security properties
- authentication mechanism
- denial of service attacks
- security threats
- computer security
- personal data
- secret key
- anomaly detection
- security measures
- malicious users
- data encryption
- access control