Understanding Fuchsia Security.
Francesco PaganoLuca VerderameAlessio MerloPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2021)
Keyphrases
- information security
- security requirements
- security threats
- network security
- security issues
- information retrieval
- security systems
- data security
- security protocols
- statistical databases
- security policies
- wireless networks
- security mechanisms
- intrusion detection
- distributed systems
- security model
- case study
- databases
- security management
- security vulnerabilities