Login / Signup

Modeling and Analyzing Security in the Presence of Compromising Adversaries.

David A. BasinCas Cremers
Published in: ESORICS (2010)
Keyphrases
  • intrusion detection
  • data sets
  • security policies
  • real time
  • neural network
  • website
  • statistical databases
  • information retrieval
  • decision making
  • case study
  • information security
  • security issues
  • modeling framework