Login / Signup

SecRet: How to Apply the 5E Model for a Master's Level Network Security Course.

Ruxandra F. Olimid
Published in: IEEE Commun. Mag. (2019)
Keyphrases
  • network security
  • intrusion detection
  • information retrieval
  • probabilistic model
  • maximum likelihood
  • decision support
  • computer networks
  • risk assessment