Invisible Security (Transcript of Discussion).
Giampaolo BellaPublished in: Security Protocols Workshop (2016)
Keyphrases
- access control
- information security
- intrusion detection
- network security
- security requirements
- security systems
- security policies
- security issues
- information assurance
- security management
- security problems
- cyber attacks
- security protocols
- computer security
- statistical databases
- information retrieval
- subject matter
- mobile devices
- word recognition
- video sequences
- database systems
- case study
- security measures
- high security
- data sets