Login / Signup
Defense in Depth Formulation and Usage in Dynamic Access Control.
Ridha Khédri
Owain Jones
Mohammed Alabbad
Published in:
POST (2017)
Keyphrases
</>
dynamic access control
access control
network security
intrusion detection
depth information
depth map
probabilistic formulation
case study
image processing
input image
lower bound
real time
computer networks
decision making
depth images
set theoretic
computer virus
computer vision