Enabling Faster Security Assessment of Re-hosted Firmware.
Giancarlo FortinoClaudia GrecoAntonella GuzzoMichele IanniPublished in: DASC/PiCom/CBDCom/CyberSciTech (2022)
Keyphrases
- risk assessment
- information security
- network security
- intrusion detection
- operating system
- key management
- security problems
- access control
- security policies
- information assurance
- security issues
- power consumption
- security protocols
- computer security
- security management
- security requirements
- security mechanisms
- encryption scheme
- functional requirements
- statistical databases
- quality assessment
- computer systems
- data sets
- network management
- authentication protocol
- security level
- cryptographic protocols
- security threats
- security vulnerabilities
- neural network