Login / Signup
Time-Scoped Searching of Encrypted Audit Logs.
Darren Davis
Fabian Monrose
Michael K. Reiter
Published in:
ICICS (2004)
Keyphrases
</>
intrusion detection
data structure
encryption key
real time
neural network
machine learning
artificial intelligence
e learning
metadata
relational databases
search strategies
closed world