Keyphrases
- countermeasures
- misuse detection
- intrusion detection system
- quantum computation
- quantum inspired
- quantum computing
- anomaly detection
- intrusion detection
- information security
- attack detection
- quantum mechanics
- detection mechanism
- attack graph
- denial of service attacks
- attack graphs
- data mining
- normal behavior
- power analysis
- malicious attacks
- security measures
- authentication protocol
- case study