Login / Signup
Evaluation of computer and network security systems.
Stelio Thompson
Published in:
ACM Annual Conference (1984)
Keyphrases
</>
security systems
rule based systems
security mechanisms
computer networks
artificial intelligence
peer to peer
biometric data
neural network
genetic algorithm
fuzzy sets
lightweight