Login / Signup

Hidden Credentials.

Jason E. HoltRobert W. BradshawKent E. SeamonsHilarie K. Orman
Published in: WPES (2003)
Keyphrases
  • access control
  • case study
  • databases
  • support vector
  • hidden information
  • database
  • neural network
  • information systems
  • web services
  • artificial neural networks
  • private data