Login / Signup

Dissecting the "Hacker Manifesto".

Steven FurnellPaul DowlandPeter W. Sanders
Published in: Inf. Manag. Comput. Secur. (1999)
Keyphrases
  • network security
  • information systems
  • data processing
  • information security
  • network traffic
  • semi supervised
  • knowledge management
  • data mining techniques