Login / Signup
Secure and Dependable Patterns in Organizations: An Empirical Approach.
Yudistira Asnar
Paolo Giorgini
Roberto Bonato
Valentino Meduri
Carlo Riccucci
Published in:
RE (2007)
Keyphrases
</>
intrusion detection
information technology
information systems
pattern mining
database
security requirements
decision making
knowledge management
distributed systems
competitive advantage
security patterns
data encryption
covert channel