Login / Signup
Build with intrinsic security: Trusted autonomy security system.
Shen He
Jing Huang
Penglin Yang
Published in:
Int. J. Distributed Sens. Networks (2020)
Keyphrases
</>
information security
network connection
security issues
access control
intrusion detection
network security
information assurance
security problems
security systems
security level
trusted computing
security model
security policies
data mining
functional requirements
security analysis
statistical databases