Checking the manipulation checks in information security research.
Kent MarettPublished in: Inf. Comput. Secur. (2015)
Keyphrases
- information security
- countermeasures
- intrusion detection
- information systems
- smart card
- security issues
- information assurance
- security requirements
- information security management
- network security
- computer security
- iso iec
- smart grid
- technical issues
- e government
- risk analysis
- data security
- privacy concerns
- risk assessment
- design theory
- security level
- cyber defense
- sensitive data
- database
- lightweight
- control system
- information technology
- data analysis