Login / Signup
Towards developing a trust-based security solution.
Sheikh Iqbal Ahamed
Donghyun Kim
Chowdhury Sharif Hasan
Mohammad Zulkernine
Published in:
SAC (2009)
Keyphrases
</>
optimal solution
security systems
access control
closed form
network security
security issues
linear equations
neural network
multi agent
search algorithm
information security
integer programming
security mechanisms
computer security
malware detection