Tutorial on telecommunications and security.
Chadwick H. NestmanJohn C. WindsorMary C. HinsonPublished in: Comput. Secur. (1984)
Keyphrases
- intrusion detection
- security problems
- access control
- security requirements
- information security
- statistical databases
- security mechanisms
- information assurance
- neural network
- network security
- security policies
- computer security
- security analysis
- cyber security
- data security
- security systems
- anomaly detection
- security threats
- e learning
- risk assessment
- risk analysis
- key management
- data integrity