Sign in

Applications and techniques in information and network security.

Jemal H. AbawajyMd. Rafiqul Islam
Published in: Concurr. Comput. Pract. Exp. (2017)
Keyphrases
  • network security
  • intrusion detection
  • information sharing
  • databases
  • data mining
  • distributed systems
  • computer systems
  • computer networks