Keyphrases
- malware detection
- intrusion detection
- mobile devices
- access control
- security policies
- security issues
- information security
- statistical databases
- functional requirements
- information assurance
- data security
- security requirements
- network management
- security problems
- security systems
- network security
- security analysis
- neural network
- mobile applications
- java card
- software architecture
- security threats
- data mining