Login / Signup
Breaking the Model: Finalisation and a Taxonomy of Security Attacks.
John A. Clark
Susan Stepney
Howard Chivers
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
computational model
mathematical model
objective function
probability distribution
probabilistic model
high level
similarity measure
network security
digital images
access control
intrusion detection
formal model
security requirements
malicious users