Login / Signup
Policies for deterring computer abuse.
Charles Cresson Wood
Published in:
Comput. Secur. (1982)
Keyphrases
</>
computer systems
genetic algorithm
optimal policy
databases
data mining
artificial intelligence
multi agent
dynamic programming
access control
machine intelligence
computer controlled