Automated Smartphone Security Configuration.
William M. FitzgeraldUltan NevilleSimon N. FoleyPublished in: DPM/SETOP (2012)
Keyphrases
- information security
- intrusion detection
- security mechanisms
- security requirements
- security systems
- statistical databases
- fully automated
- mobile devices
- access control
- semi automated
- daily life
- computer aided
- security policies
- security issues
- semi automatic
- human operators
- security protocols
- computer security
- information assurance
- security vulnerabilities
- data sets
- functional requirements
- network security
- data mining
- network management
- key management
- automated analysis
- computer networks
- mobile phone
- security level
- neural network