Security through Diversity: Are We There Yet?
Per LarsenStefan BrunthalerMichael FranzPublished in: IEEE Secur. Priv. (2014)
Keyphrases
- security requirements
- information security
- intrusion detection
- network security
- security issues
- access control
- security policies
- information assurance
- security systems
- databases
- data sets
- security model
- cyber attacks
- security properties
- security threats
- security management
- lightweight
- control system
- genetic algorithm
- user authentication
- security measures
- security vulnerabilities
- real time