Login / Signup
Security Support in Continuous Deployment Pipeline.
Faheem Ullah
Adam Johannes Raft
Mojtaba Shahin
Mansooreh Zahedi
Muhammad Ali Babar
Published in:
ENASE (2017)
Keyphrases
</>
neural network
social networks
access control
data streams
user interface
sensor networks
intrusion detection