Applying Security to SMDS: A Practical Example.
Paola FulchignoniGiovanni MarrotaAnthony J. WileyPublished in: INFOCOM (1993)
Keyphrases
- security issues
- intrusion detection
- security policies
- security requirements
- databases
- information security
- network security
- computer security
- neural network
- security vulnerabilities
- security analysis
- security properties
- security threats
- security management
- key agreement protocol
- genetic algorithm
- data encryption
- information assurance