Security Circumvention: To Educate or To Enforce?
Debabrata DeyAbhijeet GhoshalAtanu LahiriPublished in: HICSS (2018)
Keyphrases
- information security
- information assurance
- intrusion detection
- access control
- security issues
- security problems
- data security
- security analysis
- security requirements
- high security
- security policies
- network security
- security threats
- computer security
- low cost
- cyber security
- key agreement protocol
- key management
- security level
- cyber attacks
- data sets
- rfid tags
- website
- learning algorithm