Login / Signup
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Mengmeng Ge
Huy Kang Kim
Dong Seong Kim
Published in:
DSN Workshops (2017)
Keyphrases
</>
information security
network security
intrusion detection
security issues
security problems
statistical databases
access control
information assurance
security policies
intrusion detection system
biometric systems
sensitive data
functional requirements
cyber attacks
security level
malware detection