BPM supported model generation by contemplating key elements of information security.
M. MythilySanchari SahaSudhakar SelvamS. Iwin Thanakumar JosephPublished in: Autom. Softw. Eng. (2022)
Keyphrases
- information security
- countermeasures
- security issues
- information systems
- smart card
- network security
- intrusion detection
- risk assessment
- information assurance
- smart grid
- computer security
- information security management
- security requirements
- security risks
- security level
- e government
- cyber defense
- iso iec
- critical infrastructure
- risk analysis
- sensitive data