Login / Signup
Applied Digital Threat Modeling: It Works.
Rock Stevens
Daniel Votipka
Elissa M. Redmiles
Colin Ahern
Michelle L. Mazurek
Published in:
IEEE Secur. Priv. (2019)
Keyphrases
</>
data sets
feature selection
bayesian networks
real time
machine learning
artificial intelligence
information systems
knowledge base
image processing
database systems
multiscale
cooperative
lower bound
expert systems
probability distribution