Login / Signup
Applying problem-structuring methods to problems in computer security.
Peter Gutmann
Published in:
NSPW (2011)
Keyphrases
</>
computer security
methods can be applied
difficult problems
optimization problems
intrusion detection
network security
data mining
information retrieval
search methods