Keyphrases
- network monitoring
- access control
- monitoring system
- key agreement
- key management scheme
- real time
- information security
- security systems
- key management
- security requirements
- provably secure
- security policies
- human operators
- situational awareness
- wireless sensor
- security issues
- security model
- intrusion detection
- decision support
- cryptographic protocols
- security threats
- functional requirements
- key agreement protocol
- data security
- information assurance
- wireless sensor networks
- security properties
- data mining
- border security
- security measures
- security management
- security analysis
- encryption scheme
- network security
- cloud computing
- information systems