A logging maturity and decision model for the selection of intrusion detection cyber security solutions.
Manuel KernMax LandauerFlorian SkopikEdgar R. WeipplPublished in: Comput. Secur. (2024)
Keyphrases
- intrusion detection
- cyber security
- decision model
- intrusion detection system
- decision problems
- anomaly detection
- decision making
- network security
- cyber attacks
- network traffic
- false positives and false negatives
- critical infrastructure
- decision makers
- data mining
- information security
- decision theory
- smart grid
- optimal solution
- power grid
- fraud detection
- computer networks
- data mining techniques
- databases
- communication systems
- artificial intelligence
- telecommunication systems