Login / Signup

The Cascade Vulnerability Problem.

Joseph Douglas HortonR. H. CooperW. F. HyslopBradford G. NickersonO. K. WardRobert HarlandElton AshbyW. M. Stewart
Published in: J. Comput. Secur. (1993)
Keyphrases
  • expert systems
  • evolutionary algorithm
  • databases
  • neural network
  • machine learning
  • information systems
  • image segmentation
  • object recognition
  • face detection
  • risk assessment
  • face detector
  • security vulnerabilities