Login / Signup

Unveiling confidentiality-related vulnerabilities in an IMS-based environment.

Ilyas Ed-daouiTomader MazriNabil Hmina
Published in: ICMCS (2016)
Keyphrases
  • information security
  • e learning
  • closely related
  • complex environments
  • data sets
  • indoor environments
  • database
  • real time
  • genetic algorithm
  • virtual world