Login / Signup

Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us about Cybersecurity.

James PierceSarah E. FoxNick MerrillRichmond Y. Wong
Published in: Proc. ACM Hum. Comput. Interact. (2018)
Keyphrases
  • information security
  • data sets
  • computer programming
  • databases
  • neural network
  • real world
  • security vulnerabilities
  • artificial intelligence
  • information systems
  • decision trees
  • countermeasures