An Investigation into the "Beautification" of Security Ceremonies.
Giampaolo BellaKaren RenaudDiego SempreboniLuca ViganòPublished in: ICETE (2) (2019)
Keyphrases
- information security
- access control
- network security
- information assurance
- security issues
- intrusion detection
- security policies
- security problems
- security level
- security requirements
- security threats
- security systems
- computer security
- data sets
- statistical databases
- security mechanisms
- critical infrastructure
- security model
- functional requirements
- neural network
- databases