Login / Signup

A multi-pronged approach to effective application security.

Altaz Valani
Published in: Netw. Secur. (2021)
Keyphrases
  • access control
  • real time
  • key technologies
  • machine learning
  • computationally efficient
  • security management
  • network connection
  • information assurance