Login / Signup
Researchers probe security through obscurity.
Chris Edwards
Published in:
Commun. ACM (2014)
Keyphrases
</>
security requirements
security issues
information security
intrusion detection
information assurance
data mining
computer science
network security
security policies
statistical databases
security level
security threats
researchers and practitioners
computer security
data security
privacy issues
security management
machine learning
access control
high security
security problems
security properties
face recognition
information technology