The Evaluation Process of a Computer Security Incident Ontology.
Luciana Andréia Fondazzi MartimianoEdson dos Santos MoreiraPublished in: WONTO (2006)
Keyphrases
- computer security
- evaluation process
- anomaly detection
- computer systems
- intrusion detection
- evaluation criteria
- evaluation methodology
- information security
- evaluation model
- network security
- network intrusion detection
- intrusion detection system
- software quality
- real world
- network traffic
- software systems
- database
- data processing
- fuzzy logic
- case study
- information systems
- machine learning
- data sets