Computer security is broken: can better hardware help fix it?
Paul KocherPublished in: Commun. ACM (2016)
Keyphrases
- computer security
- computer systems
- hardware and software
- anomaly detection
- trusted computing
- low cost
- information security
- network security
- intrusion detection
- data processing
- network intrusion detection
- operating system
- real time
- databases
- information systems
- hardware implementation
- learning algorithm
- high dimensional
- database
- information technology
- data analysis
- reinforcement learning
- bayesian networks
- intrusion detection system
- case study
- embedded systems
- computer vision