Login / Signup
A multi-pronged approach to effective application security.
Altaz Valani
Published in:
Netw. Secur. (2021)
Keyphrases
</>
access control
real time
key technologies
machine learning
computationally efficient
security management
network connection
information assurance