Login / Signup
Automated Extraction of Vulnerability Information for Home Computer Security.
Sachini S. Weerawardhana
Subhojeet Mukherjee
Indrajit Ray
Adele E. Howe
Published in:
FPS (2014)
Keyphrases
</>
computer security
end users
domain knowledge
data mining
bayesian networks
computer systems
information sources
anomaly detection
information sharing
network security