Enabling Next-Generation Cyber Ranges with Mobile Security Components.
Enrico RussoLuca VerderameAlessio MerloPublished in: ICTSS (2020)
Keyphrases
- cyber security
- cyber defense
- cyber crime
- mobile commerce
- intrusion detection
- access control
- wireless systems
- mobile devices
- security requirements
- key management
- security mechanisms
- information security
- cyber physical systems
- statistical databases
- mobile networks
- mobile computing environment
- factor authentication
- security policies
- mobile applications
- network security
- computing environments
- information sharing
- wireless networks
- context aware
- mobile phone