Unauthorized access crime in Jordanian law (comparative study).
Hamzeh abu issaMahmoud IsmailOmar AamarPublished in: Digit. Investig. (2019)
Keyphrases
- comparative study
- unauthorized access
- access control
- intrusion detection system
- file system
- security policies
- sensitive data
- security vulnerabilities
- law enforcement
- legal reasoning
- crime investigation
- service quality
- service providers
- network security
- data mining techniques
- data sets
- computer networks
- intrusion detection
- computer systems
- data collection
- high dimensional
- feature space