Login / Signup

The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures.

Jason RiveraForrest Hare
Published in: CyCon (2014)
Keyphrases
  • countermeasures
  • information security
  • power analysis
  • rural areas
  • cyber attacks
  • decision making
  • security measures
  • java card
  • database
  • databases
  • traffic accidents