Login / Signup

Making the Best Use of Cybersecurity Economic Models.

Rachel RueShari Lawrence Pfleeger
Published in: IEEE Secur. Priv. (2009)
Keyphrases
  • feature extraction
  • learning algorithm
  • least squares
  • user behavior
  • preprocessing
  • image quality
  • genetic programming
  • nearest neighbor
  • computational intelligence