Login / Signup

Critical infrastructure protection: The vulnerability conundrum.

Alan T. MurrayTony H. Grubesic
Published in: Telematics Informatics (2012)
Keyphrases
  • risk assessment
  • real time
  • object recognition
  • social networks
  • knowledge base
  • objective function