Simulation-Based Security with Inexhaustible Interactive Turing Machines.
Ralf KüstersPublished in: CSFW (2006)
Keyphrases
- control system
- turing machine
- information security
- user friendly
- real time
- intrusion detection
- access control
- security issues
- data security
- computer security
- user interaction
- statistical databases
- security requirements
- computer vision
- security problems
- data visualization
- security mechanisms
- security analysis
- encryption scheme
- security systems
- biometric systems
- security threats
- security management
- security vulnerabilities