Required Policies and Properties of the Security Engine of an SoC.
Sajeed MohammadMridha Md Mashahedur RahmanFarimah FarahmandiPublished in: iSES (2021)
Keyphrases
- intrusion detection
- information security
- desirable properties
- data sets
- social networks
- access control
- role based access control
- security policies
- security mechanisms
- information assurance
- security threats
- authentication protocol
- computer security
- security issues
- structural properties
- network security
- smart card
- neural network