Login / Signup
Shielding your company against information compromise.
Marilyn M. Helms
Lawrence P. Ettkin
Daniel J. Morris
Published in:
Inf. Manag. Comput. Secur. (2000)
Keyphrases
</>
raw data
information sources
information processing
neural network
prior knowledge
genetic algorithm
computer vision
multiscale
keywords
information technology
context aware
user interaction
contextual information
spatial information
structural information
information fusion