Simulating Perceptions of Security (Transcript of Discussion).
Paul WernickPublished in: Security Protocols Workshop (2017)
Keyphrases
- security policies
- information assurance
- intrusion detection
- security problems
- information security
- attitudes toward
- security level
- security issues
- access control
- computer security
- security model
- security requirements
- network management
- network security
- literature review
- information systems
- security analysis
- data integrity
- security systems
- statistical databases
- security properties
- malware detection
- security threats
- security management
- security vulnerabilities
- e learning