Login / Signup
Topology aware adaptive security.
Liliana Pasquale
Carlo Ghezzi
Claudio Menghi
Christos Tsigkanos
Bashar Nuseibeh
Published in:
SEAMS (2014)
Keyphrases
</>
access control
security issues
neural network
intrusion detection
information security
security measures
security policies
security management
security threats
computer security
security vulnerabilities
data security
security analysis
security mechanisms
statistical databases
social networks
data mining