Striking a balance between SoC security and debug requirements.
Wen ChenJayanta BhadraPublished in: SoCC (2016)
Keyphrases
- functional requirements
- information security
- network security
- access control
- computer security
- intrusion detection
- information assurance
- security protocols
- security requirements
- user requirements
- security problems
- business processes
- neural network
- parallel processing
- security mechanisms
- cloud computing
- security model
- security systems
- data management
- low cost