Login / Signup
Managing the Shift in the Enterprise Perimeter in order to delay a Cybersecurity Breach.
Muyowa Mutemwa
Mfundo Glenn Masango
Noluxolo Gcaza
Published in:
icARTi (2021)
Keyphrases
</>
information systems
neural network
information retrieval
case study
data sets
machine learning
computer vision
web services
knowledge management
data management