Security architectures in constrained environments: A survey.
Philippe PittoliPierre DavidThomas NoëlPublished in: Ad Hoc Networks (2018)
Keyphrases
- information security
- security policies
- access control
- security issues
- security mechanisms
- real world
- dynamic environments
- security threats
- statistical databases
- security requirements
- information assurance
- security problems
- intrusion detection
- security systems
- heterogeneous environments
- neural network
- computer security
- key management
- human operators
- network security
- data sets
- data security
- ubiquitous computing environments
- highly dynamic
- security properties
- physical world
- security measures