Login / Signup

Protection: principles and practice.

G. Scott GrahamPeter J. Denning
Published in: AFIPS Spring Joint Computing Conference (1972)
Keyphrases
  • real world
  • data mining
  • information security
  • neural network
  • real time
  • multiscale
  • special case
  • hidden markov models