Tutorial: Investigating Advanced Exploits for System Security Assurance.
Salman AhmedLong ChengHans LiljestrandN. AsokanDanfeng Daphne YaoPublished in: SecDev (2021)
Keyphrases
- information security
- security issues
- information assurance
- access control
- security problems
- security requirements
- security policies
- smart card
- security mechanisms
- intrusion detection
- computer security
- security systems
- network security
- statistical databases
- countermeasures
- security management
- security threats
- security level
- data security
- e government
- computer networks
- user authentication
- security analysis
- key management
- functional requirements
- data sets
- web intelligence