Sign in

Capability Maturity Models for Targeted Cyber Security Training.

Sabarathinam ChockalingamEspen NystadCoralie Esnoul
Published in: HCI (35) (2023)
Keyphrases
  • cyber security
  • probabilistic model
  • intrusion detection
  • distributed systems
  • data mining techniques
  • cost effective