Research on the Rule of Law in Network Information Security Governance.
Pei ZhaobinYixiao YuPublished in: ICIC (1) (2022)
Keyphrases
- information security
- information systems
- countermeasures
- e government
- intrusion detection
- security issues
- information assurance
- computer security
- security risks
- network traffic
- security requirements
- security level
- smart grid
- communication networks
- network security
- smart card
- computer networks
- association rules
- critical infrastructure
- network management
- sensitive data
- risk assessment
- feature selection
- design theory
- information security management
- wireless sensor networks
- privacy concerns
- information technology
- database
- data security
- network structure
- security threats
- dimensionality reduction
- senior management