Login / Signup
Unveiling confidentiality-related vulnerabilities in an IMS-based environment.
Ilyas Ed-daoui
Tomader Mazri
Nabil Hmina
Published in:
ICMCS (2016)
Keyphrases
</>
information security
e learning
closely related
complex environments
data sets
indoor environments
database
real time
genetic algorithm
virtual world