How USB Does (and Doesn't) Work: A Security Perspective.
Peter C. JohnsonPublished in: login Usenix Mag. (2014)
Keyphrases
- smart card
- information security
- security issues
- security policies
- security requirements
- network security
- viewpoint
- security problems
- intrusion detection
- security threats
- data security
- functional requirements
- access control
- security management
- neural network
- security level
- databases
- security model
- security measures
- security protocols
- key management
- countermeasures
- database design
- anomaly detection
- social networks