Login / Signup
Using simulation to engineer cybersecurity requirements.
James J. Nutaro
Glenn Allgood
Phani Teja Kuruganti
Darren Highfill
Published in:
CSIIRW (2013)
Keyphrases
</>
mathematical model
simulation model
neural network
computer vision
wide range
control system
special case
probabilistic model
user requirements
simulation environment