Keyphrases
- high efficiency
- high accuracy
- information security
- security issues
- blind signature scheme
- real and synthetic datasets
- intrusion detection
- network security
- security problems
- security threats
- result quality
- access control
- security requirements
- security mechanisms
- arbitrary shape
- statistical databases
- functional requirements
- memory space
- data security
- density based clustering
- security management
- computer security
- security policies
- theorem prover