Guest editorial: Information security methodology and replication studies.
Steffen WendzelLuca CaviglioneAleksandra MilevaJean-François LalandeWojciech MazurczykPublished in: it Inf. Technol. (2022)
Keyphrases
- information security
- countermeasures
- smart card
- information systems
- security issues
- network security
- intrusion detection
- security requirements
- computer security
- special issue
- information security management
- cyber defense
- technical issues
- risk assessment
- security risks
- information assurance
- sensitive data
- iso iec
- security level
- privacy concerns
- risk analysis
- distributed databases
- data security
- database
- security threats
- case study
- learning algorithm
- machine learning