Crowdsourced Exploration of Security Configurations.
Qatrunnada IsmailTousif AhmedApu KapadiaMichael K. ReiterPublished in: CHI (2015)
Keyphrases
- information security
- security issues
- access control
- security policies
- intrusion detection
- security requirements
- low quality
- network security
- security problems
- security mechanisms
- computer security
- security systems
- security level
- statistical databases
- information visualization
- security management
- data security
- information assurance
- malware detection
- security model
- encryption scheme
- functional requirements
- intrusion detection system