Invisible Security.
Giampaolo BellaBruce ChristiansonLuca ViganòPublished in: Security Protocols Workshop (2016)
Keyphrases
- intrusion detection
- information security
- network security
- data security
- security management
- security threats
- security issues
- databases
- security problems
- security properties
- security level
- risk analysis
- security requirements
- security policies
- data mining
- neural network
- data sets
- risk assessment
- sensitive data
- access control
- key management
- low cost
- web services
- information systems