IRBs and Security Research: Myths, Facts and Mission Creep.
Simson L. GarfinkelPublished in: UPSEC (2008)
Keyphrases
- cyber defense
- information security
- security vulnerabilities
- security policies
- human operators
- information extraction
- access control
- network security
- key management
- security mechanisms
- security requirements
- security threats
- cyber attacks
- security protocols
- security issues
- statistical databases
- early stage
- intrusion detection
- functional requirements
- data sets
- data security
- security level
- malware detection
- decision making
- data mining