Login / Signup

Efficient deployment of mobile detectors for security applications.

Philipp BaumannReynold J. CooperDorit S. HochbaumNidhi PatelKunal Shalia
Published in: IEEM (2015)
Keyphrases
  • data mining
  • mobile phone
  • information security
  • cost effective
  • neural network
  • access control