Security EDA Extension through P1687.1 and 1687 Callbacks.
Michele PortolanVincent ReynaudPaolo MaistriRégis LeveugleGiorgio Di NatalePublished in: ITC (2021)
Keyphrases
- access control
- information security
- security systems
- real time
- security issues
- security requirements
- data mining
- security measures
- computer security
- security policies
- security mechanisms
- key management
- data integrity
- estimation of distribution algorithms
- data security
- network security
- user authentication
- malware detection
- security problems
- security management
- intrusion detection
- information assurance