Keyphrases
- intrusion detection
- information security
- network security
- security issues
- functional requirements
- information assurance
- data sets
- security problems
- cyber security
- security policies
- computer security
- security level
- security systems
- high security
- database
- statistical databases
- access control
- case study
- data encryption
- key agreement protocol
- security management
- security vulnerabilities
- key management
- authentication protocol
- security protocols
- security analysis
- biometric systems
- information technology
- social networks
- real time