The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers.
Sabah SuhailMubashar IqbalRaja JurdakPublished in: Commun. ACM (2024)
Keyphrases
- public key infrastructure
- information security
- security issues
- intrusion detection
- access control
- statistical databases
- computer security
- security systems
- digital objects
- security requirements
- security problems
- security mechanisms
- information assurance
- security threats
- security level
- security analysis
- cyber security
- data security
- key management
- data mining
- functional requirements
- network security
- wireless sensor networks