Login / Signup
SKRM: Where security techniques talk to each other.
Xiaoyan Sun
Jun Dai
Peng Liu
Published in:
CogSIMA (2013)
Keyphrases
</>
intrusion detection
information security
information assurance
access control
security policies
security problems
information systems
computer security
security issues
network security
security requirements
security management
neural network
biometric systems
network management
security analysis
elliptic curve