Platform Security: What is Lacking?
Roger R. SchellMichael F. ThompsonPublished in: Inf. Secur. Tech. Rep. (2000)
Keyphrases
- security requirements
- information security
- network security
- access control
- wireless sensor
- data sets
- real time
- intrusion detection
- security policies
- security properties
- security issues
- security mechanisms
- key management
- security management
- security problems
- security level
- computer security
- sensitive data
- neural network
- security analysis
- service management
- privacy preserving
- malware detection
- wireless networks
- security threats