Introduction: Virtually Perfect Security (Transcript of Discussion).
Bruce ChristiansonPublished in: Security Protocols Workshop (2010)
Keyphrases
- information security
- access control
- security issues
- information assurance
- security level
- security protocols
- security requirements
- network security
- intrusion detection
- statistical databases
- security vulnerabilities
- information retrieval
- security measures
- security management
- security problems
- word recognition
- database
- high security
- data sets
- cyber security
- neural network
- computer security
- case study
- biometric systems
- security policies