Login / Signup
Modeling and Analyzing Security in the Presence of Compromising Adversaries.
David A. Basin
Cas Cremers
Published in:
ESORICS (2010)
Keyphrases
</>
intrusion detection
data sets
security policies
real time
neural network
website
statistical databases
information retrieval
decision making
case study
information security
security issues
modeling framework