Login / Signup
Building components with embedded security monitors.
Muhammad Umair Ahmed Khan
Mohammad Zulkernine
Published in:
QoSA/ISARCS (2011)
Keyphrases
</>
security issues
security threats
intrusion detection
information security
databases
computer security
access control
software components
statistical databases
network security
security management
security problems
cyber security
security mechanisms
lightweight
distributed systems
control system
case study