Security Against Subversion in a Multi-surveillant Setting.
Geng LiJianwei LiuZongyang ZhangPublished in: ACISP (2019)
Keyphrases
- information security
- real time
- intrusion detection
- information assurance
- statistical databases
- security issues
- computer security
- information systems
- factor authentication
- security systems
- network security
- functional requirements
- security requirements
- cyber security
- security policies
- cyber attacks
- security properties
- security problems
- security management
- access control