Information security for sensors by overwhelming random sequences and permutations.
Shlomi DolevNiv GilboaMarina KopeetskyGiuseppe PersianoPaul G. SpirakisPublished in: Ad Hoc Networks (2014)
Keyphrases
- information security
- countermeasures
- security issues
- intrusion detection
- information systems
- smart card
- critical infrastructure
- network security
- computer security
- information security management
- sensitive data
- smart grid
- sensor networks
- cyber defense
- information assurance
- security risks
- risk analysis
- risk assessment
- data mining
- data security
- technical issues
- security level
- security threats
- real time
- e government
- security management
- real world
- database