Keyphrases
- security requirements
- security issues
- knowledge base
- access control
- intrusion detection
- information security
- power consumption
- security problems
- hardware and software
- statistical databases
- security protocols
- computer security
- security policies
- embedded systems
- user authentication
- cyber security
- security systems
- security properties
- information assurance
- security level
- security management
- cyber attacks
- data security
- security analysis
- functional requirements
- design methodology
- network security
- computer systems
- data processing