Managing Security Hazards in BYOD: A Comparative Analysis of Artificial Intelligent Techniques.
Marziana Abdul MajidZulkefli MansorRossilawati SulaimanPublished in: ICEEI (2023)
Keyphrases
- national security
- risk assessment
- information security
- access control
- security requirements
- intrusion detection
- security issues
- service management
- network security
- security management
- information management
- early warning
- information assurance
- database security
- security model
- security systems
- security vulnerabilities
- neural network
- homeland security
- security policies
- wireless sensor networks
- decision making
- real world
- encryption scheme
- human operators
- emergency management
- public health
- artificial life
- distributed systems
- control system
- security measures