Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Link opens in a new tab
Search content at Penn State
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
A Methodology to Automate the Security Patterns Selection
Khudema Zahra
,
Shahid Hussain
, Humaira Afzal
, Muhammad Rafiq Mufti
, Dost Muhammad Khan
, Muhammad Khalid Sohail
School of Engineering (Behrend)
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'A Methodology to Automate the Security Patterns Selection'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Design Problem
100%
Experimental Result
100%
Software Systems
100%
Security Problem
100%
Security Design
100%
Selection Process
100%
fuzzy c mean
100%
Text Categorization
100%
Security Measure
100%
Step Methodology
100%
Design Pattern
100%
Software Development Lifecycle
100%
Keyphrases
Pattern Selection
100%
Proposed Methodology
50%
Selection Strategy
25%
Software System
25%
Security Issues
25%
Design Problems
25%
Fuzzy C-means
25%
Text Categorization
25%
Software Development Life Cycle
25%
Security Measures
25%
Novice Users
25%