Login / Signup

Applying problem-structuring methods to problems in computer security.

Peter Gutmann
Published in: NSPW (2011)
Keyphrases
  • computer security
  • methods can be applied
  • difficult problems
  • optimization problems
  • intrusion detection
  • network security
  • data mining
  • information retrieval
  • search methods