Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications.
Daegeon KimHuy Kang KimPublished in: CoRR (2019)
Keyphrases
- security requirements
- smart card
- security analysis
- information security
- security mechanisms
- security policies
- security concerns
- access control
- security problems
- security model
- security patterns
- reference models
- security properties
- secure electronic
- software architecture
- mobile commerce
- requirements engineering
- databases
- low cost
- artificial intelligence
- data warehouse