Login / Signup

Evaluation of computer and network security systems.

Stelio Thompson
Published in: ACM Annual Conference (1984)
Keyphrases
  • security systems
  • rule based systems
  • security mechanisms
  • computer networks
  • artificial intelligence
  • peer to peer
  • biometric data
  • neural network
  • genetic algorithm
  • fuzzy sets
  • lightweight