Liquid interrogator for security applications.
Souvik DubeyKien TaJung-Chih ChiaoPublished in: IEEE SENSORS (2017)
Keyphrases
- information security
- intrusion detection
- information assurance
- security problems
- access control
- security level
- security policies
- security issues
- computer security
- security model
- statistical databases
- security mechanisms
- security systems
- security properties
- mathematical model
- computer networks
- network security
- boundary conditions
- security requirements
- data security