Sign in

Cyber defense technology networking and evaluation.

Ruzena BajcsyTerry BenzelMatt BishopRobert BradenCarla E. BrodleySonia FahmySally FloydW. HardakerAnthony D. JosephGeorge KesidisKarl N. LevittRobert LindellPeng LiuDavid J. MillerRuss MundyClifford NeumanRon OstrengaVern PaxsonPhillip A. PorrasCatherine RosenbergJ. Doug TygarShankar SastryDaniel F. SterneShyhtsun Felix Wu
Published in: Commun. ACM (2004)
Keyphrases
  • cyber defense
  • cost effective
  • data processing
  • rapid development
  • computer systems
  • information security
  • real time
  • social networks
  • information technology
  • peer to peer
  • context aware