Applications of Trusted Review to Information Security.
John YesbergMarie HendersonPublished in: ACISP (2001)
Keyphrases
- information security
- countermeasures
- information systems
- security issues
- smart card
- network security
- intrusion detection
- information assurance
- computer security
- security requirements
- security level
- smart grid
- literature review
- risk assessment
- information security management
- risk analysis
- e government
- iso iec
- cyber defense
- sensitive data
- technical issues
- data mining
- critical infrastructure
- active learning
- security risks
- information technology