Login / Signup
Limiting the undesired impact of cyber weapons: technical requirements and policy implications.
Steven M. Bellovin
Susan Landau
Herbert S. Lin
Published in:
J. Cybersecur. (2017)
Keyphrases
</>
wide variety
potential impact
user requirements
high impact
public health
database
real time
learning algorithm
optimal policy
application specific
management information systems
cyber security
management policies