Aligning Two Specifications for Controlling Information Security.
Riku NykänenTommi KärkkäinenPublished in: Int. J. Cyber Warf. Terror. (2014)
Keyphrases
- information security
- countermeasures
- information systems
- smart card
- computer security
- security requirements
- security issues
- intrusion detection
- security level
- information security management
- network security
- risk assessment
- information assurance
- risk analysis
- e government
- sensitive data
- iso iec
- image registration
- smart grid
- security risks
- machine learning
- critical infrastructure
- case study
- real world