POSTER: IMD Security vs. Energy: Are we tilting at windmills?
Muhammad Ali SiddiqiChristos StrydisPublished in: CoRR (2019)
Keyphrases
- information security
- access control
- intrusion detection
- energy consumption
- security issues
- security problems
- security systems
- security protocols
- computer security
- energy minimization
- security measures
- security policies
- network security
- security mechanisms
- high security
- security threats
- low energy
- security vulnerabilities
- security properties
- security level
- key management
- neural network
- functional requirements
- security requirements
- distributed systems