Login / Signup
Toward an Evidence-based Design for Reactive Security Policies and Mechanisms.
Omer Katz
Benjamin Livshits
Published in:
CoRR (2018)
Keyphrases
</>
security policies
design process
database
access control
query processing
unsupervised learning
software architecture
network security
security concerns