What Security can we Achieve in 4-Rounds?
Carmit HazayMuthuramakrishnan VenkitasubramaniamPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- intrusion detection
- network security
- security requirements
- computer security
- information security
- security issues
- security mechanisms
- genetic algorithm
- security management
- database
- security level
- security systems
- security model
- cyber security
- smart grid
- risk analysis
- intrusion detection system
- lightweight
- anomaly detection
- access control
- neural network
- real time