Login / Signup
Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us about Cybersecurity.
James Pierce
Sarah E. Fox
Nick Merrill
Richmond Y. Wong
Published in:
Proc. ACM Hum. Comput. Interact. (2018)
Keyphrases
</>
information security
data sets
computer programming
databases
neural network
real world
security vulnerabilities
artificial intelligence
information systems
decision trees
countermeasures