Login / Signup
SecRet: How to Apply the 5E Model for a Master's Level Network Security Course.
Ruxandra F. Olimid
Published in:
IEEE Commun. Mag. (2019)
Keyphrases
</>
network security
intrusion detection
information retrieval
probabilistic model
maximum likelihood
decision support
computer networks
risk assessment