Login / Signup
Computational Evaluation of Software Security Attributes.
Gwendolyn H. Walton
Thomas A. Longstaff
Richard C. Linger
Published in:
HICSS (2009)
Keyphrases
</>
decision making
empirical evaluation
machine learning
comparative evaluation
genetic algorithm
artificial intelligence
knowledge base
search algorithm