Login / Signup
Building Technologies that Help Cyber-Defense: Hardware-enabled Trust.
Claire Vishik
Ruby B. Lee
Fred Chong
Published in:
ISSE (2012)
Keyphrases
</>
cyber defense
real time
information security
cyber attacks
computer systems
low cost
data processing
trust model
intrusion detection
data acquisition
cyber security
data mining
data warehouse
e government
embedded systems