The role of the adversary model in applied security research.

Computers & Security(2019)

引用 76|浏览60
暂无评分
摘要
•Adversary model in applied security research.•Adversary model for mobile and IoT security.•Digital forensic adversary models.•Zero permission adversary models.•Graphical-based authentication adversaries.
更多
查看译文
关键词
Adversary Model,Applied security,IoT Security,Forensic Adversary Model,Mobile Security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要