Keyphrases
- upper bound
- lower bound
- security issues
- enterprise network
- access control
- information security
- security systems
- upper and lower bounds
- security policies
- upper bounding
- tight bounds
- network topologies
- lower and upper bounds
- network analysis
- network security
- computer networks
- intrusion detection
- social networks
- security mechanisms
- sample size
- worst case
- statistical databases
- network design
- security requirements
- theoretical analysis
- information systems