Login / Signup
Emerging threats.
Brian Hernacki
Published in:
WORM (2005)
Keyphrases
</>
information security
countermeasures
cyber security
cyber attacks
data sets
data mining
genetic algorithm
smart card
critical infrastructure
security vulnerabilities