Login / Signup
Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures.
Christopher Bailey
Rogério de Lemos
Published in:
Future Gener. Comput. Syst. (2020)
Keyphrases
</>
social networks
image sequences
missing data
gold standard
learning algorithm
information systems
database systems
evolutionary algorithm
data management
evaluation criteria
malicious users
malicious behavior
detect malicious