Login / Signup
On Adversary Models and Compositional Security.
Anupam Datta
Jason Franklin
Deepak Garg
Limin Jia
Dilsun Kirli Kaynar
Published in:
IEEE Secur. Priv. (2011)
Keyphrases
</>
model selection
experimental data
probabilistic model
access control
intrusion detection
databases
neural network
parameter estimation
complex systems
information security
network security
security issues