Embedded Device Forensics and Security.
Kim-Kwang Raymond ChooYunsi FeiYang XiangYu YuPublished in: ACM Trans. Embed. Comput. Syst. (2017)
Keyphrases
- virtual private network
- access control
- intrusion detection
- embedded systems
- network security
- information security
- security requirements
- statistical databases
- rfid tags
- security issues
- security management
- security properties
- key management
- database
- computer networks
- social networks
- neural network
- security mechanisms
- data acquisition
- security analysis
- security protocols
- data security
- security model
- security level
- digital images
- security vulnerabilities