Login / Signup
Applying the principles of zero-trust architecture to protect sensitive and critical data.
David Greenwood
Published in:
Netw. Secur. (2021)
Keyphrases
</>
data sets
data collection
raw data
training data
computer systems
synthetic data
data structure
data points
knowledge discovery
small number
data mining techniques
database
data sources
end users
statistical analysis
data objects
original data
data quality
data acquisition
data distribution
input data
feature space