Login / Signup
Modeling of attacking and defending strategies in situations with intentional threats.
Xiaofeng Hu
Shifei Shen
Jiansong Wu
Published in:
ISCRAM (2012)
Keyphrases
</>
search algorithm
neural network
information security
countermeasures
computer vision
website
bayesian networks
intrusion detection
privacy preserving