Login / Signup
Modeling the behavior of users who are confronted with security mechanisms.
Sebastian Möller
Noam Ben-Asher
Klaus-Peter Engelbrecht
Roman Englert
Joachim Meyer
Published in:
Comput. Secur. (2011)
Keyphrases
</>
security mechanisms
resource constrained
access control
smart card
security issues
security systems
security problems
security threats
operating system
real time
data mining
artificial intelligence
information systems
data processing
resource constraints
security requirements