Effects of Degree Correlations in Interdependent Security: Good or Bad?
Richard J. LaPublished in: CoRR (2017)
Keyphrases
- intrusion detection
- access control
- information security
- network security
- security requirements
- security mechanisms
- security threats
- security systems
- information assurance
- neural network
- data security
- security issues
- case study
- computer security
- functional requirements
- security properties
- security problems
- security management