8.1 via check point methodology within corporate intranet in future communication security.
Hai-Cheng ChuDer-Jiunn DengHan-Chieh ChaoPublished in: Secur. Commun. Networks (2011)
Keyphrases
- communication protocols
- intrusion detection
- security issues
- access control
- statistical databases
- information security
- communication systems
- information processing systems
- network management
- physical layer
- real world
- security policies
- network security
- competitive intelligence
- long term
- security threats
- security problems
- single point of failure
- security level
- security mechanisms
- security requirements
- case study
- communication protocol
- resource constrained
- data acquisition
- information sharing
- secure communication
- cyber physical systems
- knowledge management