Keyphrases
- access control
- intrusion detection
- upper bound
- security requirements
- information security
- information assurance
- security mechanisms
- neural network
- security problems
- security analysis
- network security
- lower bound
- security policies
- security vulnerabilities
- security threats
- security systems
- worst case
- security issues
- statistical databases
- risk assessment
- mobile devices
- key management
- computer security
- security protocols
- security model
- security properties
- data mining
- face detection
- real time