On metrics and prioritization of investments in hardware security.
Zachary A. CollierBrett BrigliaTom FinkelstonMark C. ManascoDavid L. SlutzkyJames H. LambertPublished in: Syst. Eng. (2023)
Keyphrases
- random number generator
- security requirements
- low cost
- real time
- information security
- security issues
- network security
- hardware and software
- access control
- information technology
- trusted computing
- security mechanisms
- security systems
- computer security
- protection schemes
- application level
- security level
- regression testing
- windows xp
- key management
- computing power
- embedded systems
- biometric systems
- hardware architecture
- computing systems
- data acquisition
- security measures
- intrusion detection
- mobile devices
- image processing