Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security.
Hassan KhodaiemehrDaniel PanarioMohammad-Reza SadeghiPublished in: ISCISC (2018)
Keyphrases
- information security
- countermeasures
- information systems
- security issues
- smart card
- information security management
- network security
- intrusion detection
- computer security
- security requirements
- smart grid
- cyber defense
- security level
- sensitive data
- information assurance
- data security
- security threats
- security risks
- privacy concerns
- risk analysis
- database
- training set
- artificial intelligence
- machine learning
- real world