Login / Signup
Secured Cyber-Attack Signatures Distribution using Blockchain Technology.
Oluwaseyi Ajayi
Melvin Cherian
Tarek N. Saadawi
Published in:
CSE/EUC (2019)
Keyphrases
</>
cyber attacks
cost effective
cyber security
data processing
computer systems
rapid development
computational intelligence
decision support system