Login / Signup

On Adversary Models and Compositional Security.

Anupam DattaJason FranklinDeepak GargLimin JiaDilsun Kirli Kaynar
Published in: IEEE Secur. Priv. (2011)
Keyphrases
  • model selection
  • experimental data
  • probabilistic model
  • access control
  • intrusion detection
  • databases
  • neural network
  • parameter estimation
  • complex systems
  • information security
  • network security
  • security issues