Login / Signup
How to Design Computer Security Experiments.
Sean Peisert
Matt Bishop
Published in:
World Conference on Information Security Education (2007)
Keyphrases
</>
computer security
case study
user interface
probabilistic model
anomaly detection
intrusion detection
neural network
machine learning
decision making
data mining techniques