Information Security Meets Adversarial Examples.
Matthias KirchnerCecilia PasquiniIlia ShumailovPublished in: WIFS (2019)
Keyphrases
- information security
- countermeasures
- security issues
- information systems
- computer security
- intrusion detection
- security level
- smart card
- security requirements
- information assurance
- risk assessment
- network security
- information security management
- cyber defense
- sensitive data
- risk analysis
- design theory
- e government
- privacy concerns
- data security
- user authentication
- security risks
- iso iec
- technical issues
- data acquisition
- security management
- software engineering
- artificial intelligence