Survey of 3D Printer Security Offensive and Defensive.
Jiayuan ZhangMengyue FengYuhang HuangTao FengWenjie WangHe WangHan ZhangPublished in: FCS (2021)
Keyphrases
- access control
- security requirements
- information security
- security issues
- network security
- intrusion detection
- statistical databases
- security analysis
- information assurance
- data collection
- security problems
- functional requirements
- security policies
- computer security
- literature review
- security systems
- security properties
- key management
- security protocols
- security model
- network management
- high security