Login / Signup
Securing cyberspace.
Gang Li
Wenjia Niu
Li Guo
Lynn Margaret Batten
Yinlong Liu
Guoyong Cai
Published in:
Concurr. Comput. Pract. Exp. (2016)
Keyphrases
</>
digital world
web technologies
information security
databases
decision making
mobile devices
learning algorithm
artificial intelligence
trade off
decision support system
operating system
identity management