Board security enhancement using new locking SIB-based architectures.
Jennifer DworakZoe ConroyAlfred L. CrouchJohn C. PotterPublished in: ITC (2014)
Keyphrases
- information security
- security systems
- intrusion detection
- image processing
- security level
- security policies
- security management
- functional requirements
- security issues
- security threats
- image enhancement
- statistical databases
- information systems
- contrast enhancement
- access control
- database systems
- information assurance
- security mechanisms
- key management
- computer security
- data integrity
- network security
- security measures