Login / Signup

Securing Unprotected NTP Implementations Using an NTS Daemon.

Martin LangerThomas BehnRainer Bermbach
Published in: ISPCS (2019)
Keyphrases
  • information technology
  • data sets
  • trade off
  • information security
  • efficient implementation
  • databases
  • genetic algorithm
  • decision making
  • expert systems
  • multiresolution