Information security for sensors by overwhelming random sequences and permutations.
Shlomi DolevNiv GilboaMarina KopeetskyGiuseppe PersianoPaul G. SpirakisPublished in: CCS (2010)
Keyphrases
- information security
- countermeasures
- security issues
- smart card
- information systems
- critical infrastructure
- computer security
- intrusion detection
- sensor networks
- network security
- security requirements
- security level
- information assurance
- information security management
- cyber defense
- smart grid
- iso iec
- e government
- privacy concerns
- design theory
- data mining
- real time
- risk assessment
- computer systems