Keyphrases
- information security
- intrusion detection
- security policies
- theoretical analysis
- computer security
- network security
- security requirements
- access control
- cyber attacks
- key management
- functional requirements
- security issues
- real time
- cyber security
- elliptic curve
- security systems
- security level
- cryptographic protocols
- security threats