Sign in
Applications and techniques in information and network security.
Jemal H. Abawajy
Md. Rafiqul Islam
Published in:
Concurr. Comput. Pract. Exp. (2017)
Keyphrases
</>
network security
intrusion detection
information sharing
databases
data mining
distributed systems
computer systems
computer networks