Login / Signup
Protection: principles and practice.
G. Scott Graham
Peter J. Denning
Published in:
AFIPS Spring Joint Computing Conference (1972)
Keyphrases
</>
real world
data mining
information security
neural network
real time
multiscale
special case
hidden markov models