Three ID-based information security functions.
Wei-Bin LeeChin-Chen ChangPublished in: Comput. Commun. (1997)
Keyphrases
- information security
- security issues
- countermeasures
- information systems
- intrusion detection
- smart card
- information security management
- security requirements
- e government
- smart grid
- network security
- risk assessment
- security level
- cyber defense
- sensitive data
- risk analysis
- information assurance
- iso iec
- data mining
- cyber security
- critical infrastructure
- technical issues
- dimensionality reduction
- security risks
- e learning
- computer systems