Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.
Alwyn GohDavid Ngo Chek LingPublished in: Communications and Multimedia Security (2003)
Keyphrases
- video conferencing
- automatic detection
- detection algorithm
- false alarms
- neural network
- object detection
- security model
- detection rate
- security policies
- detection method
- security requirements
- detection scheme
- detection accuracy
- false positives
- anomaly detection
- group communication
- threshold selection
- security analysis
- security issues
- lightweight
- database systems
- genetic algorithm