Login / Signup

Automated Extraction of Vulnerability Information for Home Computer Security.

Sachini S. WeerawardhanaSubhojeet MukherjeeIndrajit RayAdele E. Howe
Published in: FPS (2014)
Keyphrases
  • computer security
  • end users
  • domain knowledge
  • data mining
  • bayesian networks
  • computer systems
  • information sources
  • anomaly detection
  • information sharing
  • network security