Login / Signup
How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
Ragib Hasan
Shams Zawoad
Shahid Al Noor
Md Munirul Haque
Darrell Burke
Published in:
COMPSAC (2016)
Keyphrases
</>
insider attacks
insider threat
protocol stack
lightweight
communication networks
wireless sensor networks
network structure
decision support system
key management
cryptographic protocols
security architecture