Applications of Linearised and Sub-linearised Polynomials to Information Security.
Marie HendersonPublished in: ACISP (1998)
Keyphrases
- information security
- countermeasures
- security issues
- smart card
- information systems
- network security
- model predictive control
- intrusion detection
- information assurance
- computer security
- security requirements
- security level
- cyber defense
- risk analysis
- risk assessment
- iso iec
- design theory
- information security management
- security risks
- sensitive data
- smart grid
- database
- data security
- privacy concerns
- anomaly detection
- machine learning