Login / Signup
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.
Mustafa Aydin
Jeremy L. Jacob
Published in:
EISIC (2015)
Keyphrases
</>
security measures
user preferences
critical infrastructure
user interface
security systems
information security
data analysis
telecommunication systems
human users
intrusion detection
cloud computing
collaborative filtering
security threats
end users
information assurance
information systems
security breaches