Home > Refereed Conference Papers > The Challenges of Using an Intrusion Detection System: Is It Worth the Effort? > Keywords |
<record>
<controlfield tag="001">154</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Intrusion Detection</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Usable Security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Collaboration</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Qualitative Research</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Security Tools</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Organizational Factors</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">HOT Admin</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">issnet</subfield>
</datafield>
</record>