Sign in

Evolving Secure Information Systems through Attack Simulation.

Elmar KieslingAndreas EkelhartBernhard GrillChristian StummerChristine Strauss
Published in: HICSS (2014)
Keyphrases
  • information systems
  • information technology
  • key exchange protocol
  • security measures
  • neural network
  • health care
  • simulation models
  • authentication mechanism
  • simulation model
  • multi party
  • security requirements