Generating Look-alike Names For Security Challenges.
Shuchu HanYifan HuSteven SkienaBaris CoskunMeizhu LiuHong QinJaime PerezPublished in: AISec@CCS (2017)
Keyphrases
- security problems
- security issues
- security concerns
- information security
- intelligence community
- intrusion detection
- security and privacy issues
- information assurance
- lessons learned
- security requirements
- key issues
- network management
- security systems
- security mechanisms
- statistical databases
- access control
- keywords
- data sets
- rfid tags
- security policies
- network security
- cyber security
- intrusion detection system
- security management
- distributed systems
- security measures
- e government
- case study