Speaker Verification Method Using HTM for Security System.
Yuki SakaguchiRin HirakawaHideki KawanoKenichi NakashiYoshihisa NakatohPublished in: IHIET (Paris) (2020)
Keyphrases
- verification method
- model checking
- temporal logic
- access control
- security issues
- speech recognition
- information security
- security requirements
- speaker verification
- intrusion detection
- security policies
- security systems
- network security
- audio visual
- security problems
- malware detection
- computer security
- security management
- information assurance
- security threats
- security vulnerabilities
- automatic speech recognition
- critical infrastructure
- sensitive data
- information systems
- database systems
- knowledge base