Login / Signup
IT Security Modeling.
Andrzej Bialas
Published in:
Security and Management (2005)
Keyphrases
</>
real time
information security
intrusion detection
access control
network security
computer security
database
information retrieval
genetic algorithm
computer systems
cryptographic protocols