Computer security by hardware-intrinsic authentication.
Caio HoffmanMario Lúcio CôrtesDiego F. AranhaGuido AraujoPublished in: CODES+ISSS (2015)
Keyphrases
- computer security
- computer systems
- hardware and software
- trusted computing
- information security
- low cost
- intrusion detection
- anomaly detection
- network security
- real time
- user authentication
- data processing
- operating system
- intrusion detection system
- embedded systems
- biometric authentication
- computer forensics
- databases
- data encryption
- security mechanisms
- information technology
- pattern recognition
- feature extraction
- decision trees
- data sets