Keyphrases
- control system
- fuzzy logic
- information security
- access control
- critical infrastructure
- closed loop
- security issues
- real time
- control algorithm
- semi automated
- intrusion detection
- control strategy
- information assurance
- security systems
- computer security
- human operators
- network security
- security policies
- security requirements
- fully automated
- security analysis
- security management
- control law
- pid controller
- key management
- mathematical model
- operating system
- security properties
- security problems
- remote monitoring
- database