Keyphrases
- case study
- real world
- malware detection
- access control
- mobile devices
- statistical databases
- information security
- social networks
- intrusion detection
- computer security
- security issues
- test cases
- computer networks
- network structure
- security policies
- enterprise network
- security systems
- heterogeneous networks
- security vulnerabilities
- security level
- practical guidelines
- security requirements
- network analysis
- network security
- end to end
- business process
- distributed systems