Benchmarking and Configuring Security Levels in Intermittent Computing.
Archanaa S. KrishnanPatrick SchaumontPublished in: ACM Trans. Embed. Comput. Syst. (2022)
Keyphrases
- information security
- security issues
- security problems
- intrusion detection
- security policies
- high levels
- network security
- security level
- functional requirements
- security requirements
- model based diagnosis
- access control
- security threats
- data sets
- information assurance
- levels of abstraction
- security management
- high security
- cyber security
- security mechanisms
- database
- wireless sensor networks
- database systems
- databases
- real time