Simulating Perceptions of Security.
Paul WernickBruce ChristiansonJoseph SpringPublished in: Security Protocols Workshop (2017)
Keyphrases
- intrusion detection
- statistical databases
- information security
- computer security
- security policies
- security issues
- security requirements
- security management
- access control
- information assurance
- real time
- security level
- security model
- rfid tags
- functional requirements
- security mechanisms
- attitudes toward
- data integrity
- cyber security
- data security
- statistically significant
- case study
- cryptographic protocols
- security threats
- neural network
- high security
- data sets