Modelling Correct Operation of Webcams for Security Purposes: (Abstract Only).
Blaine BillingsXenia MountrouidouPublished in: SIGCSE (2018)
Keyphrases
- security issues
- security policies
- intrusion detection
- information security
- security systems
- security requirements
- security problems
- security properties
- access control
- computer security
- wireless sensor networks
- network security
- countermeasures
- user authentication
- elliptic curve
- security mechanisms
- functional requirements
- databases
- statistical databases
- database systems
- case study
- social networks