Login / Signup
Computer Security Techniques: List of controls by cost.
Esther H. Highland
Published in:
Comput. Secur. (1983)
Keyphrases
</>
computer security
computer systems
information security
anomaly detection
intrusion detection
network security
image segmentation
network intrusion detection
databases
intrusion detection system
information technology
probabilistic model
total cost