Intentionality and Agency in Security.
Kat KrolDavid Llewellyn-JonesSeb AebischerClaudio DettoniFrank StajanoPublished in: Security Protocols Workshop (2018)
Keyphrases
- security issues
- information security
- intrusion detection
- counter terrorism
- security vulnerabilities
- access control
- security mechanisms
- security level
- data security
- statistical databases
- security requirements
- neural network
- information assurance
- high security
- security management
- cyber security
- security policies
- network security
- authentication protocol
- security systems
- security problems
- security analysis
- security measures
- functional requirements
- real time