Effects of Degree Correlations in Interdependent Security: Good or Bad?
Richard J. LaPublished in: IEEE/ACM Trans. Netw. (2017)
Keyphrases
- network security
- access control
- information security
- security issues
- security problems
- intrusion detection
- security mechanisms
- security requirements
- information assurance
- security policies
- security vulnerabilities
- functional requirements
- electronic commerce
- computer security
- data security
- security model
- security systems
- cyber attacks
- security level
- case study
- high security
- neural network